Vous êtes sur la page 1sur 92

Sendio® Email System Protection

Administration Manual
Sendio software versions 5, 6, 7, and 8

Sendio, Inc. ▪ 4911 Birch, Suite 150 ▪ Newport Beach, CA 92660 USA ▪ +1.949.274.4375 ▪ www.sendio.com
© 2015 Sendio, Inc. All Rights Reserved
Sendio and the Sendio logo are trademarks of Sendio, Inc.
Comments, corrections and suggestions regarding this
document should be sent to:
support @ sendio.com
SENDIO A D M I N I S T R AT I O N M A N U A L

Table of Contents
INTRODUCTION 1
SENDIO USER ROLES . . . . . . . . . . . . . . . . . . . . . .1
DOCUMENTATION. . . . . . . . . . . . . . . . . . . . . . . 1
CONVENTIONS IN THIS MANUAL . . . . . . . . . . . . . . . . 2

SECTION 1: CONCEPTS AND DEFINITIONS 3

SECTION 2: LOGGING IN TO SENDIO 5

SECTION 3: SENDIO INTERFACE CONCEPTS 7


PAGE DISPLAYS. . . . . . . . . . . . . . . . . . . . . . . . 7
Table-Oriented Controls. . . . . . . . . . . . . . . . . . 8
List-Oriented Controls . . . . . . . . . . . . . . . . . . . 9
HIDING THE NAVIGATION MENU . . . . . . . . . . . . . . . . 11

SECTION 4: ADMIN MENU OVERVIEW 13

SECTION 5: SYSTEM PAGES 15


THE SYSTEM > OPTIONS PAGES . . . . . . . . . . . . . . . . 15
Integrity Services . . . . . . . . . . . . . . . . . . . . . 16
Message Journaling. . . . . . . . . . . . . . . . . . . . 20
THE SYSTEM > CONTACTS PAGE. . . . . . . . . . . . . . . . . 22
Creating a New Contact . . . . . . . . . . . . . . . . . . 23
Changing the View of the Contacts Page . . . . . . . . . . . 24
Custom Contact search.... . . . . . . . . . . . . . . . . 24
System > Contacts > Actions Options. . . . . . . . . . . . 26
Import Contacts. . . . . . . . . . . . . . . . . . . . . 26
Export All Contacts . . . . . . . . . . . . . . . . . . . . 27
Edit Selected Contact . . . . . . . . . . . . . . . . . . . 28
THE SYSTEM > INBOUND CONTROL PAGE. . . . . . . . . . . . 28
Address Validation. . . . . . . . . . . . . . . . . . . . 29
Sender IP Address. . . . . . . . . . . . . . . . . . . . 30
Anti-Virus . . . . . . . . . . . . . . . . . . . . . . . . 31
Zero-Hour . . . . . . . . . . . . . . . . . . . . . . . . 31
Bulk. . . . . . . . . . . . . . . . . . . . . . . . . . 32
ANTI-SPOOFING STANDARDS. . . . . . . . . . . . . . . . . . 32

PA G E i
A D M I N I S T R AT I O N M A N U A L SENDIO

DKIM Inbound . . . . . . . . . . . . . . . . . . . . . . 33
DomainKeys Inbound . . . . . . . . . . . . . . . . . . . 33
SPF. . . . . . . . . . . . . . . . . . . . . . . . . . . 33
THE SYSTEM > OUTBOUND CONTROL PAGE . . . . . . . . . . . 35
Address Validation. . . . . . . . . . . . . . . . . . . . 36
Anti-Virus & Zero-Hour. . . . . . . . . . . . . . . . . . 36
DKIM Outbound. . . . . . . . . . . . . . . . . . . . . 36
General . . . . . . . . . . . . . . . . . . . . . . . . 37
Attachment Control. . . . . . . . . . . . . . . . . . . . 37
Address Validation. . . . . . . . . . . . . . . . . . . . 39
Anti-Virus & Zero-Hour. . . . . . . . . . . . . . . . . . 39
DKIM Outbound. . . . . . . . . . . . . . . . . . . . . 39
THE SYSTEM > SSL PAGE . . . . . . . . . . . . . . . . . . . . 41
THE SYSTEM > SILVERLIST PAGE. . . . . . . . . . . . . . . . . 42
THE SYSTEM > SPF EXEMPTION PAGE. . . . . . . . . . . . . . 44

SECTION 6: GLOBAL VIEWS PAGES 45

SECTION 7: DIRECTORIES PAGES 47


CREATING A NEW DIRECTORY. . . . . . . . . . . . . . . . . 47
MODIFYING AN EXISTING DIRECTORY DEFINITION. . . . . . . . . 49
MANUALLY SYNCHRONIZING DIRECTORIES . . . . . . . . . . . . 49
ACTIVE DIRECTORY OBJECTS . . . . . . . . . . . . . . . . . . 50

SECTION 8: DOMAINS PAGES 51


CREATING A NEW DOMAIN. . . . . . . . . . . . . . . . . . 51
DOMAIN-LEVEL CONFIGURATION . . . . . . . . . . . . . . . . 52
DKIM Signing . . . . . . . . . . . . . . . . . . . . . . 52

SECTION 9: ACCOUNTS PAGES 55


Addresses . . . . . . . . . . . . . . . . . . . . . . . . 56
Options . . . . . . . . . . . . . . . . . . . . . . . . . 56
Contacts. . . . . . . . . . . . . . . . . . . . . . . . 57
Inbound and Outbound . . . . . . . . . . . . . . . . . . 57
SilverList. . . . . . . . . . . . . . . . . . . . . . . . 58

SECTION 10: ADDRESSES PAGES 59

SECTION 11: LOGS 61

PA G E i i
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 12: QUEUE SUMMARY 63


Queue Summary Version 8 Software . . . . . . . . . . . . 63
Queue Summary Versions 5, 6, and 7 Software . . . . . . . . 66

SECTION 13: DKIM PRIMER 67

SECTION 14: MESSAGING INTERACTION 69

SECTION 15: SYSTEM EMAIL MESSAGES 71


MAINTENANCE RELEASE NOTIFICATIONS . . . . . . . . . . . . 71

SECTION 16: SAV MESSAGES 75

GLOSSARY 83

PA G E i i i
A D M I N I S T R AT I O N M A N U A L SENDIO

PA G E i v
SENDIO A D M I N I S T R AT I O N M A N U A L

INTRODUCTION
Congratulations! The decision to install Sendio® into your communications
environment is going to result in very happy end-users who receive all of
their legitimate email and no junk, and dramatically reduce the administrative
overhead of managing email security.

SENDIO USER ROLES


Conceptually, there are two “classes” of Sendio users:
▪▪ End-users (called simply Users in this manual) are individuals
whose email inboxes are protected by Sendio. For each protected
email account, there is a corresponding “account” on Sendio that
is accessible via a Web interface. The Sendio User Web interface is
described in the Sendio User Guide.
▪▪ Administrators are individuals that install, configure and maintain
Sendio systems. When an Administrator logs in to the Sendio Web
interface, they have an additional “slider” button that allows them to
access the system administrative configuration features.

INTRODUCTION
DOCUMENTATION
Documentation for Sendio is organized into a number of different manuals and
guides. These are summarized below.

Administration Manual
THIS DOCUMENT. It describes the functionality of all Sendio features, and
discusses configuration options and trade-offs. Intended for Administrators.

Backup & Restore Guide


Describes the processes for copying important data files from Sendio to a
backup environment, and the processes for restoring backed-up data to Sendio
in the event of a system failure. Intended for Administrators.

Deployment Guide
A checklist of activities to support the implementation of Sendio in any
network. It is focused on Network details, Corporate Policy considerations and
End-User notification. Intended for Administrators.

Installation Guide
A detailed description of the configuration that must be done in order to install
Sendio on your network. It encompasses firewall modifications, IP address
assignments and mail server administration. It also addresses server hardware
installation. Intended for Administrators.

PA G E 1
A D M I N I S T R AT I O N M A N U A L SENDIO

Quick Start Guide


An abbreviated 15-step process for complete Sendio installation and mail
routing. Comprehensive installation details are found in the Installation Guide.
Intended for Administrators.

User Guide
Describes in vivid detail the User experience in the Sendio web interface. It is
appropriate to post this tutorial (in .PDF format) on a company intranet for User
reference. Intended for Users.

User Quick Start Guide


Designed to be an easy reference for the most commonly used functions of the
User interface on an Sendio. Intended for Users.

CONVENTIONS IN THIS MANUAL

N OTE: A Note is information that deserves special consideration.

T
INTRODUCTION

ROUBLESHOOTING TIP: A Troubleshooting Tip provides information that


has been known to help solve various problems.

W ARNING: A Warning identifies information that could lead to


unintended consequences if not properly considered.

Data that is typed into a field in the GUI is identified using this Courier
font.

Menu Commands
Sendio’s web interface has menu commands that you follow to change display
pages, open dialog boxes and initiate certain actions. Primary menu commands
(or paths through the interface) are shown in bold type in the format Admin >
System > Outbound Control. This example would mean:
▪▪ the Admin menu
▪▪ the System button
▪▪ the Outbound Control tabbed page
The options on drop-down menus, such as Accept Contacts only, are shown in
italics.

Sendio Terminology
Words that have special meaning within the context of Sendio operations are
shown in italics, such as Accept-List, Established or Waiting.

PA G E 2
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 1: CONCEPTS AND DEFINITIONS


Before diving in to all of the details involved in administering Sendio it will be
useful to first review a number of concepts and definitions that the reader of
this manual is presumed to understand.

Platform
Sendio is a custom-built server appliance running a high-security
implementation of the Linux operating system. Sendio has developed a large
number of email message processing “services” that run on the system. Many
of these services are administratively configurable. Sendio is also available as
a hosted service. Everything in this manual applies to both the appliance and
hosted version - there are no differences.

Message Flow
Sendio is installed “logically” between the Internet and one or more email

SECTION 1: CONCEPTS AND


servers (e.g., MS Exchange or Lotus Notes). The corporate MX (Mail eXchange)
record in DNS is set to point to Sendio, causing all email from the Internet to
be routed to Sendio. Sendio receives the messages, processing them through

DEFINITIONS
a series of email integrity services, eliminating the unwanted messages, and
forwarding the clean email to the email server(s) for delivery to end-users.

W ARNING: It is recommended that the Sendio appliance be installed


“behind” the organization’s firewall. Sendio does have its own
internal firewall. However, any system directly accessible from the
Internet has the potential of being compromised. It is assumed that
your organization employs “best practices” to protect Sendio from
external attack.

Workflow
Sendio is a sophisticated system that implements a highly configurable
workflow engine. A high-level model of the workflow is shown in Figure [1]. The
Administrator can configure specific policy and system behavior for each stage
in the workflow.
▪▪ Sender Check: the system does a series of tests using the Domain
Name Service (DNS) and other mechanisms to identify and classify the
original sender of a message
▪▪ Recipient Check: the system verifies that the intended recipients of a
message have accounts on the target email server
▪▪ SilverListing: the system uses a series of low-level SMTP tests to
determine the validity of the sending email server
▪▪ Anti-Virus / “Malware”: the system scans all messages to ensure that
they do not contain viruses, trojans, bots or other “malware”
▪▪ Corporate Policy: the system implements policies for handling large
messages, those with “untrusted” attachments, or with an excessive
number of recipients
[1] Sendio High-Level Workflow
Model

PA G E 3
A D M I N I S T R AT I O N M A N U A L SENDIO

▪▪ Standards Policy: messages are checked against industry standards for


sender authentication, such as DKIM and SPF
▪▪ Contacts Check / SAV: messages are checked against both system and
individual user Accept-Lists, Hold-Lists and Drop-Lists, and may be
processed using Sender Address Verification (SAV)

Service Availability
Sendio Administrators must decide how to balance the need for security
against the desire for maximum productivity. Specifically, there are a number of
configuration options that specify how the Sendio workflow should respond if
one of the email integrity services becomes unavailable for a period of time.
For example, if the anti-virus scanning service for inbound messages becomes
unavailable, should email keep flowing or should it be halted until the service
is restored. Since the risks associated with virus infections are high, this might
be a prudent choice. In contrast, it may be quite acceptable to maintain email
flow if the Zero-Hour checking for outbound messages becomes unavailable for
a period.
SECTION 1: CONCEPTS AND

Relationships, Ownership and “Default” Settings


Sendio maintains a database of the email inboxes that are protected and
DEFINITIONS

the relationships between the various addresses, domains and directories


that comprise the email environment. The diagram below shows a high-level
representation of these relationships. It also includes a “default” level that
holds the default settings for options.

The arrows in the diagram


indicate “ownership,” meaning (6) “Default”
that Addresses are “owned” by
both Accounts and Domains,
Accounts are owned by
Directories, and both Domains (5) System
and Directories are owned by
the System.
All mail operations which make
a decision based on a option
setting in Sendio look up the (4) Directories
setting for the recipient of
the message currently being
delivered. If no setting exists (3) Domains
at the Addresses level, then
the setting is inherited from (2) Accounts
the related “owning” level, in
numerical order as shown. If
no setting is supplied at the
System level, then the default
settings are used. (1) Addresses

Once a Domain is created, it must have one or more Directories assigned. If an


email server manages a domain that is not configured in Sendio, email sent to
an address in that domain will not be processed by Sendio.

PA G E 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 2: LOGGING IN TO SENDIO


During the Sendio installation process, a DNS Host record (A) that “names” the
Sendio server is recommended.

EXAMPLE sendio.firstfederal.com

Using a Web browser, connect to Sendio with this name.

EXAMPLE http://sendio.firstfederal.com

N OTE: The Sendio web interface currently supports


only Microsoft Internet Explorer11 (IE11), Chrome,
Firefox, and Safari browsers. Other browsers may
work, but are not formally supported.

A Sendio login screen will be displayed, in one of two

SECTION 2: LOGGING IN
versions. The default requires an email address and network
password, typically the same as your email account login, as
shown in Figure [2].
[2] Sendio Default Login Window

If the Allow Remember Me on Login option on the Admin


> System > Options page (described in Section 5) has been
Enabled, then the login screen will include a Remember Me
check box (Figure [3]).

[3] Sendio Login Window w/ ‘Remember Me’ Check The Remember Me option causes Sendio to “remember” the
Box email address authentication for a configurable period of
time, so that this login step is skipped in the future.

Sendio will automatically terminate a connection from the


interface after 20 minutes of inactivity, requiring either
a re-login or a session restart depending on whether the
Remember Me option has been selected. (Figures [4] & [5])
The GUI Inactivity Timeout can be configured on the Admin >
System > Options page to a value of 10 minutes, 20 minutes
[4] Expired Login (No ‘Remember Me’) (default), 30 minutes or 1, 2, 3, or 4 hours.

[5] Inactive Session Notice (‘Remember Me’)

PA G E 5
A D M I N I S T R AT I O N M A N U A L SENDIO

T ROUBLESHOOTING TIP: In the event that the web interface login fails,
investigate the following possibilities:
▪▪ The login account used to synchronize password has changed
▪▪ Sendio has lost communication with the directory server and is
therefore unable to validate the directory password
▪▪ The directory synchronization process has not yet occurred
▪▪ Changes have been made to the Directory (eg a CN has been
renamed)
In any case, you may use the sysconfig administrative login and
access the functions of the server. The format of this user is
sysconfig@icebox and the password is the previously set sysconfig
password. As the Administrator, you may have also set up a local
password for any Sendio Account which can also be used in this
scenario. If you suspect that Sendio has lost communications with
the directory services, you may use the sysconfig interface to ping
the directory server. You may also navigate to the menu
option on the Admin menu and synchronize the directory, which
will verify communications and also confirm that the addresses have
SECTION 2: LOGGING IN

been synchronized to Sendio. Navigate to the menu


option to verify that the original email address that was attempted
during login appears on this list.

PA G E 6
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 3: SENDIO INTERFACE CONCEPTS


The Sendio web interface is composed of a navigation menu
(left side) and a page display area (right side), shown in Figure
[6].

Navigation Page Display


Menu Area

[6] Web GUI Layout

Two different navigation menus, one for Users and an

SECTION 3: GUI CONCEPTS


User Slider
expanded one for Administrators, are comprised of
navigation buttons as shown in Figure [7].
Users with administrative privileges (i.e., Administrators) have
an “slider” at the bottom of their User navigation
menu (left example above). Clicking on the slider
causes the Admin menu to “slide” up and display as shown in
the right example above. Clicking on the slider at the
top of the Admin navigation menu makes the Admin menu
slide away to reveal the User menu again. Users without
administrative privileges will not have the slider.

Buttons
N OTE: The User menu and its functions are described
in the Sendio User Guide.

Admin Slider

[7] User and Admin Navigation Menus

PAGE DISPLAYS
Clicking on different navigation menu buttons causes different
Sendio information and configuration pages to be displayed.
Some pages show information in tables and others in list
format (described in more detail below).
Some pages are actually multiple pages separated into “tabs”.
Examples of tabbed pages are shown in Figure [8].

[8] Examples of Pages with Tabs

PA G E 7
A D M I N I S T R AT I O N M A N U A L SENDIO

Pages include various control buttons that modify the display or change
information, as shown in Figure [9].

[9] Examples of Control Buttons

Some control buttons cause additional pages (or “windows”)


to “pop up” on top of primary pages, as shown in Figure [10].
SECTION 3: GUI CONCEPTS

[10] Example Pop-up Window


Table-Oriented Controls
Many pages display information in tables,
such as the Inbound Messages and
Outbound Messages pages. [11]
The number of records displayed in a table
page is 50. If the table contains more than
50 records, controls are
displayed in the upper right of the page that
allow you to jump between pages.

The button causes a page to


be reloaded in the browser.

The button opens a pop-up [11] Example of a Page Showing a


window that lets you create a new record. Table

The button opens either a drop-down list or a pop-up window of


alternate criteria for viewing the displayed table.

The button opens a drop-down list of actions that can be


performed to modify the information in the table. Specific records can be
modified individually or in a batch by “checking” the box(es) next to the record
number(s). [12]

N OTE: Holding the Shift key and clicking lets you select a contiguous
range of records. Holding the Ctrl key lets you select individual
records as a group (but don’t Ctrl-Click on the check boxes). [12] Check boxes

PA G E 8
SENDIO A D M I N I S T R AT I O N M A N U A L

Clicking on a table column title or icon causes the table to


resort the records in either ascending or descending order

[13] Table Records Sorted by Date

SECTION 3: GUI CONCEPTS


[14] Table Records Sorted by Subject

List-Oriented Controls
Many pages display configuration options in lists, such as
the Admin > System > Options tab. [15]
Most options can be configured at the System level,
meaning the top administrative level for Sendio, thereby
defining behavior for the overall system. Many options can
also be modified at the Domain and Account (User) level,
providing levels of customizability for sub-groups of users.
Some options are configured at only the Domain level
(e.g., DKIM Prefix).
This permissions architecture allows an Administrator to
tailor Sendio email integrity functionality to their specific
environment and user community.
[15] Example of a Page Showing a List of Options

PA G E 9
A D M I N I S T R AT I O N M A N U A L SENDIO

All configuration options share some common GUI controls, such as the Help
icon, the Option Select icon and the Option Override Lock icon. Depending on
the nature of the range of values for a option, different value selection controls
are used.
Clicking on the Info icon for a configuration option causes Information text
for the option to be displayed, consisting of a brief description, the inherited
value of the option, the timestamp for when the option was last set, and the
username of the Administrator who made the last setting. This Information text
can also be displayed by clicking on the option name in the list.
The Option Select check box identifies whether the option is configured at a
particular level in the hierarchy. If the box is not checked, the value display is
“grayed out” and shows the value inherited from a higher level in the hierarchy,
with the name of the level from which the value is inherited in parentheses.
If the box is checked, a value can be specified or chosen from the available
options.
If the Option Override Lock icon is “unlocked” , then the value set for
the option can be reconfigured by the Administrator at a lower level in the
hierarchy. If the icon is “locked” then the value cannot be checked and
SECTION 3: GUI CONCEPTS

changed at a lower level.


You can change the Option Override Lock icon state back and forth from
“locked” to “unlocked” by clicking on the icon.

List of “Info” “Option Select” “Option Override Option Selector Drop-


Options Icon Check Box Lock” Icon Down List

Option Selector “Type


In” Field

Drop-Down List
Expanded

Option Selector
“Slider Bar”

Drop-Down List
Expanded

[16] List-Oriented Controls

PA G E 1 0
SENDIO A D M I N I S T R AT I O N M A N U A L

If an unlocked option is set at a lower level, and then the option is locked at a
higher level, the lower level settings are ignored.
Some configuration options have only a pre-defined set of choices available,
while others are set by typing in values. Those with pre-defined values use a
drop-down list to present the choices that can be selected.
Some configuration options take numerical input that is set by controlling a
“slider bar” with your mouse. Moving a slider bar all the way to the right causes
the value to be set to Unlimited if appropriate. Slider bar controls do not permit
precision value setting.

HIDING THE NAVIGATION MENU


Sometimes it is desirable to hide the User or Admin navigation menu so that
there is more room to see the page display. Clicking on the Menu Slider causes
the navigation menu to close
or reopen. [17] [18]

SECTION 3: GUI CONCEPTS


Menu Slider

[17] Navigation Menu Open

Menu Slider

[18] Navigation Menu Closed

PA G E 1 1
A D M I N I S T R AT I O N M A N U A L SENDIO

This page intentionally left blank

PA G E 1 2
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 4: ADMIN MENU OVERVIEW


The Admin menu has seven navigation buttons that allow the Administrator to
access distinct parts of the Sendio system.

The menu button opens a group of tabbed pages that allow the
Administrator to configure system-wide options for Sendio. Functions such as
the Internal Mail host settings, anti-virus actions and corporate policy settings
are configured here.

The menu option gives the Administrator views across both


Inbound and Outbound Message Queues of all the user accounts on Sendio.

The menu option is where the directory services connection


(such as LDAP or Active Directory) is specified.
All the email domains that will receive traffic through Sendio are defined from

SECTION 4: ADMIN MENU


the menu option. This essentially defines the address spaces that
are handled by Sendio.
[19] Admin Navigation Menu

OVERVIEW
From the menu option, an Administrator can access information
about any user account. User options, addresses, contacts and message queues
can be managed.

The menu option displays a cross reference of email addresses


to their associated accounts. Address options can be managed

The menu option provides a real-time interface to the SMTP, SMTPS,


HTTP(s), SAV, MTA. FTP, Pass-Through and Auto-Accept logs on Sendio. There is
an export function from any of these logs.

The following sections will describe the system functions and display pages
available through each of the Admin menu buttons.

PA G E 1 3
A D M I N I S T R AT I O N M A N U A L SENDIO

This page intentionally left blank

PA G E 1 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 5: SYSTEM PAGES

The button on the Admin menu


provides access to the majority of Sendio
configuration functions. These functions
are divided into six areas identified on the
six page tabs: Options, Contacts, Inbound
Control, Outbound Control, SSL, and
SilverList.
The default view of the Admin > System
pages is the Contacts page. It is not possible
to change the default view of the Admin >
System pages.

THE SYSTEM > OPTIONS


PAGES

SECTION 5: SYSTEM >


The Admin > System > Options pages
[20] display a list of options for Sendio

OPTIONS
that can be set at the System level. Many
of the options can also be set at the
Domains, Accounts and Addresses levels
as appropriate (described in later sections).
The following sections describe each of the
options.

[20] The Admin > System > Options Page

PA G E 1 5
A D M I N I S T R AT I O N M A N U A L SENDIO

Preferred Locale: (Default: English (United States)) The preferred locale for
choosing display language and formats. Currently, only English (United States) is
available.
Preferred Time Zone: (Default: UTC) Indicates the time zone for date and time
display in the Web interface. It does not affect timestamps in email, which use
the Sendio server’s internal timezone setting (set in sysconfig).
Organization Name: (Default: “My Organization”) The name of the
organization Sendio is serving. The value is typed directly into the value box.
This is also the name of the organization that is included in the SAV message
that is sent out from Sendio. This option can be set at the Domains level
allowing different organizational units to be served separately with distinct
organization names in the SAV messages, and at the Accounts and Addresses
level if desired.
Internal Mail Host: (Default: No Setting) The machine name or IP address of
the Internal Mail Transport Authority (MTA) to which accepted messages will
be delivered. Sendio must have port 25 (SMTP) connectivity to the server that
is indicated by this option value. If Sendio is in a DMZ or in a geographically
disparate location from the email server, the firewall must be configured to
allow this traffic to pass. At the Domains level, this value can be set to allow
mail for different domains to pass to different mail servers. This can be set at
SECTION 5: SYSTEM >

the Accounts and Addresses level if necessary.

N
OPTIONS

OTE: If a machine name is used, it must have a DNS MX or A record


resolvable by Sendio to one or more IP addresses.

Outbound Proxy: (Default: No Setting) In the event that there is an outbound


proxy between Sendio and the Internet for outbound mail, Sendio can be
configured to send email through that proxy by entering the IP address or
hostname into this field.
Internal Mail Host Domain Rewrite: (Default: No Setting) If set, this value
rewrites the domain of the recipient address before sending the message to the
internal mail server. This option is rarely used.

Integrity Services
Integrity Services is the combination of SilverListing, Sender Address Verification
and Contact Checking. Integrity Services, as well as each individual component,
can be configured at the System, Domain, Account and Address level.
When Integrity Services are disabled messages are not stored locally and,
therefore, are not displayed in the message queue GUI. The one exception to
this rule occurs if the message is determined to have a virus. In this case, the
held or rejected message will be displayed in the user’s message queue.
Messages which bypass Integrity Services are displayed in a different log than
normal messages. This log can be viewed by clicking the “Passthrough Log”
button in the Logs tab of the web GUI.

N OTE: Accounts/Users with Integrity Services disabled are unable to


receive daily queue summary notifications.

Integrity Services: (Default: Enabled) Indicates whether or not the Integrity


Services option is enabled. Disabling Integrity Services disables all sub-options
as well.

PA G E 1 6
SENDIO A D M I N I S T R AT I O N M A N U A L

SilverListing: (Default: Enabled) Indicates whether or not the SilverListing


process is enabled. Please see the SilverListing section later in this document
for more information.
SilverListing Spoof Protection: (Default: Enabled) Indicates whether or not
the SilverListing process is applied to messages which are received from email
addresses in a Contact list but from a IP which has not previously passed the
SilverList test. Please see the SilverListing section later in this document for
more information.
SilverListing Service Outage: (Default: Allow Message) Indicates what to do
with messages in the event the SilverListing service is unavailable. Options are
Allow Message or Defer Message.
Contact Checking: (Default: Enabled) Indicates whether or not the Contact
Checking process is enabled. If Contact Checking is disabled Sender Address
Verification will be disabled as well.
Sender Address Verification (SAV): (Default: Enabled) Indicates whether or
not the Sender Address Verification (SAV) process is enabled for non-Bulk
messages.

N OTE: If you are evaluating Sendio, you may choose to set this value to
Disabled and Unlocked. Then, at the Accounts level, several users

SECTION 5: SYSTEM >


can be selected to evaluate the functionality by setting this value to
Enabled.

OPTIONS
Send SAV for Bulk Messages: (Default: Disabled) Indicates whether or not the
Sender Address Verification (SAV) process is enabled for Bulk messages.
Send SAV Acknowledgments: (Default: Enabled) Indicates whether or not the
Sender Address Verification (SAV) process will send an acknowledgment email
to the original sender once they complete the SAV process.
When No Contact Matches: (Default: Hold Message) Instructs Sendio how to
respond to non-Bulk messages which do not match a Contact.
When No Contact Match for Bulk Message: (Default: Hold Message) Instructs
Sendio how to respond to Bulk messages which do not match a Contact.
Queue Summary: (Default: Disabled) Indicates whether Queue Summary emails
are sent to Users and Groups. If you have the Sendio 6 OS, the Queue Summary
options are Enabled or Disabled. If you have the Sendio Version 7 or Sendio
Version 8 software, there are three options available:
▪▪ Enabled: Users and Groups
▪▪ Enabled: Users Only
▪▪ Disabled
The “Enabled: Users Only” setting allows a single setting to disable Queue
Summaries for all distribution group Accounts on the system. To enable the
Queue Summary for specific groups only, go to Accounts, select the specific
Group account, and then select Enabled: Users and Groups in the Options tab
for the Account. For more information, see Section 12: Queue Summary.

N OTE: In Version 8, the Queue Summary and Queue Summary Allow


User Subscribe/Unsubscribe settings behave as follows: If you
want users to receive Queue Summaries, you must enable Queue
Summary and set the Queue Summary User Subscribed field to
“Yes”.

PA G E 1 7
A D M I N I S T R AT I O N M A N U A L SENDIO

Queue Summary Delivery Target: (Default: 8:00) Specifies the target time by
which all Queue Summary messages are to be delivered to users on a particular
day, in 24-hour format. See Section 12: Queue Summary for more details.
Queue Summary #2 (OPTIONAL) Delivery Target: (Default: Disabled)
Supported in Version 8 software only. Specifies the target time, in 24-hour
format, of an optional second Queue Summary. The time for the second
Queue Summary should be at least 5 hours later than the first Queue Summary
delivery target.
Queue Summary Web Interface URL: (Default: No Setting) Specifies the
URL used in the Queue Summary email that is sent to users. The URL
can be preceded by http (unsecure, port 80) or https (secure, port 443)
(recommended). The URL must be followed by a trailing forward slash “/”. If the
URL is available only internally, then users who attempt to click an Accept link
from outside the firewall will receive an error message. A DNS entry for external
and internal access should be made available.
Queue Summary Show Alternate: (Default: Enabled) Enables the display of
bulk messages in the email notification below the standard Pending Queue
summary.
Queue Summary Automatic Login: (Default: Disabled) Supported in Version
SECTION 5: SYSTEM >

8 software only. When enabled, non-Admin users can click any link from the
Queue Summary email to log in automatically, with no password ever required.
For security, the authorization token built into the HTTP links expires after 28
OPTIONS

hours automatically.
Queue Summary Allow User Sub/Unsub: (Default: Enabled) Supported in
Version 8 software only. Allows users to unsubscribe or subscribe to the Queue
Summary email self-service. The unsubscribe option is available in the Queue
Summary email and in the “Account Info” section of the user’s Sendio web
interface. To use this function, set the Queue Summary to “Enabled” for the
System or Account.
Queue Summary User Subscribed: (Default: Yes) Supported in Version 8
software only. Specifies whether users are subscribed to the Queue Summary.
To use this function, set the Queue Summary to “Enabled” for the System or
Account.

Pending Queue Lifetime: (Default: 2 weeks) The Pending Queue, also known as
the Message Queue, is where messages are kept until they are verified through
the SAV process or discarded. This value can be set for as little as one day or as
long as four weeks. If this value is changed, the expiration dates of messages
currently in the system are not modified.

N OTE: For high message volume environments, best performance is


achieved by keeping the Pending Queue Lifetime as low as business
requirements will allow.

Verification Request Template: (Default: Standard Request (English)) This


option can be modified to change between English, Spanish and combination
templates. See Section 16: SAV Messages for more details.
Verification Acknowledgement Template: (Default: Standard Request
(English)) This option can be modified to choose between English, Spanish and
combination templates.

PA G E 1 8
SENDIO A D M I N I S T R AT I O N M A N U A L

Bounce Template: (Default: Standard Bounce (English)) In the situation where


Sendio receives an SAV Response to a message that has been deleted either
manually or through the aging process, a bounce message will be generated.
Attach Original to Verification Request: (Default: Attach Message Headers
Only) Indicates whether or not to attach a copy of the ORIGINAL MESSAGE
BEING VERIFIED to the verification request message. Can be set to attach the
entire original message, only the headers, or no attachment. Attaching the
entire message is strongly discouraged as this may cause other servers to
mistake an SAV Request for a spam messages.
Attach Original to Verification Acknowledgement: (Default: Attach Message
Headers Only) Indicates whether or not to attach a copy of the ORIGINAL,
VERIFIED MESSAGE to the verification acknowledgement message. Can be
set to attach the entire original message, only the headers, or no attachment.
Attaching the entire message is discouraged.
Attach Verification Message to Verification Acknowledgement: (Default:
Don’t Attach) Indicates whether or not to attach a copy of the RETURNED
VERIFICATION MESSAGE to the verification acknowledgement message.
Can be set to attach the entire verification message, only the headers, or no
attachment.

SECTION 5: SYSTEM >


Attach Original to Bounce: (Default: Attach Message Headers Only) Indicates
whether or not to attach a copy of the ORIGINAL MESSAGE BEING BOUNCED

CONTACTS
to the bounce message. Can be set to attach the entire original message,
only the headers, or no attachment. Attaching the entire message is strongly
discouraged as this may cause other servers to mistake the bounce message for
a spam messages.
Attach Original to Bounce: (Default: Attach Message Headers Only) Indicates
whether or not to attach a copy of the ORIGINAL MESSAGE BEING BOUNCED
to the bounce message. Can be set to attach the entire original message,
only the headers, or no attachment. Attaching the entire message is strongly
discouraged as this may cause other servers to mistake the bounce message for
a spam messages.
24h System Sender Response Limit: (Default: 50) Defines the maximum
number of system messages (NDR, DNS, SAV) Sendio will generate to any
particular email address in a 24 hour period.
24h Per User Sender Response Limit: (Default: 1) Defines the maximum
number of system messages from a given Sendio user to any particular email
address in a 24 hour period.
Allow User Message Preview: (Default: Enabled) This option allows the
Administrator to block the view of the message content via the Sendio web
interface. The message can be viewed at the user’s Mail Client, but not via the
Sendio web interface.
Allow User System Contact View: (Default: Enabled) Allows the System level
contacts to be visible by Users. Users will be able to click on User > Contacts >
System Contacts and view a table of the System contacts.
Allow User Rejected Message View: (Default: Enabled) Allows the Rejected
Messages view to be visible by Users. Users will be able to click on Inbound
Messages > Views > Rejected Messages and view a table of the Rejected
messages.
Allow Admin Message Preview: (Default: Enabled) Blocks the administrative
view of the message content via the web interface. The message can be viewed
at the user’s Mail Client, but not via the Sendio web interface.

PA G E 1 9
A D M I N I S T R AT I O N M A N U A L SENDIO

Incoming Proxies: (Default: Disabled) Indicates whether an organization’s


incoming mail is first received by a proxy before reaching Sendio. If there is a
proxy, this value should be set to Enabled.

N OTE: In some cases, firewalls can be configured to be mail proxies.


The test is whether the firewall makes store-and-forward decisions
regarding accepting email.

Sender Proxy Analysis: (Default: Enabled) Sendio is capable of determining the


IP address of the remote sending server (prior to local proxies) by inspecting
the headers of the message. This is required for proper function of SPF and IP-
specific Contacts, but has a small performance overhead. If the network has an
active proxy and SPF checking is desired, this value should be set to Enabled.
Proxy Identifiers: (Default: empty) The IP addresses and/or hostnames of all
mail proxies should be listed in comma separated format.
Allow Remember Me on Login: (Default: Disabled) Enables the display of
Remember Me check box in the web interface login screen [21]. Selecting
Remember Me instructs the web interface to remember the user’s email Remember Me
address and password for the duration specified by the Remember Me
SECTION 5: SYSTEM >

Duration option. [21] Remember Me login check box


Remember Me Duration: (Default: 2 weeks) Specifies for how long the system
OPTIONS

should wait before requiring re-authentication of login credentials if a user


checks the Remember Me box on the login screen. Options are 1, 2, 3, 4, 5, 6
days, or 1, 2, 3, 4 weeks.
Delivery Status Notifications: Controls the generation of Delivery Status
Notifications to internal and external recipients. Delivery Status Notifications
are generated when Sendio is not able to immediately deliver a message.
To Internal Senders > Initial DSN After: (Default: No DSNs Sent) Specifies when
the initial Delivery Status Notification is generated for Outbound messages and
delivered to internal senders. Options are No DSNs Sent, 5 minutes, 20 minutes,
1 hour, 4 hours, 8 hours or 1 day.
To Internal Senders > Minimum Time Between DSNs: (Default: No Subsequent
DSNs) Specifies when additional Delivery Status Notification are generated
for Outbound messages and delivered to internal senders. Options are No
Subsequent DSNs, 1 hour, 4 hours, 8 hours, 1 or 2 days.

To External Senders > Initial DSN After: (Default: No DSNs Sent) Specifies
when the initial Delivery Status Notification is generated for Inbound messages
and delivered to external senders. Options are No DSNs Sent, 5 minutes, 20
minutes, 1 hour, 4 hours, 8 hours or 1 day.

To External Senders > Minimum Time Between DSNs: (Default: No Subsequent


DSNs) Specifies when additional Delivery Status Notification are generated
for Inbound messages and delivered to external senders. Options are No
Subsequent DSNs, 1 hour, 4 hours, 8 hours, 1 or 2 days.

Message Journaling
Message Journaling allows for copies of messages to be delivered to an external
email archiving or journaling solution. Based on the way Sendio processes
messages, Journaling includes all inbound messages that have passed the
SilverList test. Message Journaling only works for inbound messages.

PA G E 2 0
SENDIO A D M I N I S T R AT I O N M A N U A L

Message Journaling: (Default: Disabled) Turns the Message Journaling feature


On or Off.

Journaling Host: (Default: No setting) Hostname or IP address of journaling/


archiving host to which a copy of all messages will be sent.

Journaling Mailbox: (Default: No setting) Email address of mailbox on the


internal email server to which a copy of all messages will be sent. If Journaling
Host is configured with an IP address or Host Name messages will be delivered
to the mailbox on the Journaling Host.

Journaling Failsafe Mailbox: (Default: No setting) Email address of mailbox on


a separate email server to which a copy of all messages will be sent in the event
the Journaling Host or Journaling Mailbox are unreachable. If a permanent
failure is returned by the Journaling Host the Journaling Failsafe Mailbox will
be tried immediately. If Sendio is unable to contact the Journaling Host the
Journaling Failsafe Mailbox will be used once the Journaling Timeout (below)
has been exceeded.

Journaling Timeout: (Default: 1 day) The amount of time Sendio will continue
to attempt sending of messages to the Journaling Host before sending to the

SECTION 5: SYSTEM >


Journaling Failsafe Mailbox. Options are 1, 2, 4 or 12 hours, 1, 2, 3, 4, 5 or 6
days or 1 or 2 weeks.

CONTACTS
Journaling Queue Limit: (Default: 10,000) The number of messages that will be
held in the Journaling queue before Sendio begins deferring messages.

Journaling Queue Alert Threshold: (Default: 1,000) The number of messages


that will be held in the Journaling queue before Sendio begins notifying the
Sendio administrator. Email notifications will be sent to either the email
address(s) specified at Sendio Console Interface > System Configuration
> Alert Addresses or accounts that have been configured with Sendio
administrator access at Sendio Console Interface > Directory Management >
Modify User Access.

Journaling Queue Alert Interval: (Default: 1 hour) The interval at which


Journaling Queue Alert Threshold messages are sent to administrators. Options
are every 10, 20 or 30 minutes or 1, 2, 3 or 4 hours.

List Message Auto Accept: (Default: Disabled) List Message Auto Accept
applies additional logic to list (i.e., newsletter) messages. By enabling this
option Sendio will attempt to determine which list messages are valid and
automatically accept them.

Add Contact on Auto-Accept: (Default: Disabled) If a list message is accepted


via the List Message Auto Accept option, should an Account Contact be
automatically created for the sending email address.

GUI Inactivity Timeout: (Default: 20 minutes) If a user leaves their web


browser open to the Sendio web interface, after how long will the session
timeout. Options are every 10, 20 or 30 minutes or 1, 2, 3 or 4 hours.

N OTE: Remember to click the button if any changes


are made to any options or else the changes will be lost when you
exit.

PA G E 2 1
A D M I N I S T R AT I O N M A N U A L SENDIO

THE SYSTEM > CONTACTS PAGE


The Admin > System > Contacts page displays a table of system-wide contacts.
[22] These addresses represent individuals or organizations whose emails are
to be either “accepted”, “held” or “dropped” on a system-wide basis if they are
received by Sendio.
SECTION 5: SYSTEM >
CONTACTS

[22] The Admin > System > Contacts Page

N OTE: It is suggested that System contacts be compiled and imported


into Sendio prior to full deployment to reduce the initial number of
SAV messages to known contacts, if desired. See Admin > System >
Contacts > Actions below.

On the left side of the page is a column with a square two-

color icon in the header: . Each record in the table has


either a green, a red or a white/gray icon in this column.
A green icon indicates that the address of this
“sender” is on the system Accept-List and that
messages from this sender are to be immediately
delivered to the destination inbox.
A red icon indicates that the address of this “sender”
is on the system Drop-List and that messages from

this sender are to be immediately discarded and not delivered to the


destination inbox.
A white/gray icon indicates that the address of this “sender” is on the
system Hold-List and that messages from this sender are to be held in a

PA G E 2 2
SENDIO A D M I N I S T R AT I O N M A N U A L

user’s Pending Queue, and either manually released to the inbox or simply
allowed to “age out” of the queue.

Creating a New Contact

To enter a new contact, click the button. The pop-up window shown
in Figure [23] appears. Enter the name and email address of the contact in the
appropriate fields. One or more wildcards (*) may be used at any point in the
email address.

[23] Create a New Contact

N OTE: At this time it is not possible


to list IP addresss by range.
Each IP address will require a
N OTE: The Name field is for display purposes only.

separate Contact entry. To add an entire domain to the Accept-List, the email format is *@
domainname.com.

IP Field

SECTION 5: SYSTEM >


The IP field allows you to input a specific IP address from which the
corresponding email address must originate. Mail from this email address with

CONTACTS
a different IP address will not match the Contact. If left blank, the IP field will
be filled with a “*” indicating that this particular contact’s email can come from
any IP address.

Action Field
The Action field has three options on a drop-down menu [24].
▪▪ Accept adds the contact to the system Accept-List
[24] Action Options
▪▪ Drop adds the contact to the system Drop-List
▪▪ Hold adds the contact to the system Hold-List

N OTE: Drop-List contacts should be created only in cases where


messages are reaching your inboxes from a well-known unwanted
source. Excessive use of Drop contacts can adversely affect system
performance.

The Hold action leaves a message visible in the Message Queue for manual
handling. Having a Hold contact is also like having no contact at all, but prevents
Sendio from sending an SAV message out. It can be useful for dealing with
domains that use auto-responders when there is a desire for Sendio to avoid
sending SAV messages to these auto-responders.

Phase Field
A System Contact also has a Phase indication. [25] The phase of a contact
indicates the order in which the contact is checked against the System-,
Domain- and User-based Contact Lists.
[25] Phase Options
The order of checking contacts is:
1. System Pre-User
2. Domain Pre-User
3. User
PA G E 2 3
A D M I N I S T R AT I O N M A N U A L SENDIO

4. Domain Post-User
5. System Post-User
A Phase of Pre-User will prevent Users from overriding a System Contact, while
Post-User allows them to customize their Contact lists.

EXAMPLE
A contact with a phase of Post-User will be checked after the contact
is checked against the User Contact List. A contact with a phase of
Pre‑User will be checked against the System Contact List prior to a
User List.

If a contact is on multiple Contact Lists with conflicting workflow definitions (eg


on both an Accept-List and a Drop-List), the order of priority is that the Accept-
Lists are checked first, then the Hold-Lists, and then the Drop-Lists.

N
[26] Anti-Spoofing Contact Exception
OTE: By default, when a new Domain is added a Drop Contact entry for
your organization domain(s) is added, with a Post-User phase Figure
SECTION 5: SYSTEM >

[26]. The format would be *@yourdomain.com. The reason for


this is that only your email server should generate messages from
CONTACTS

your domain. If a message from the internet is coming into your


organization from your domain, then some type of “spoofing” is
probably occurring and the message will be rejected.

Changing Contact Information


To change any of the information in an existing
contact, select the record and click Actions... > Edit
Selected Contact, or double-click the contact entry
in the Contact List. The pop-up window will be
displayed. Modify the contact information and save
the changes.
[27] Admin > System > Contacts >
View Menu
Changing the View of the Contacts Page
The default view of the Admin > System > Contact page

shows all contacts. Clicking on the button opens


a drop-down menu with other view options. There are also
shortcut keys that can be used to initiate these views. [27]

Custom Contact search...


If a specific contact needs to be located, the Custom Contact
search… option can be used. [28] Contact List Search Window
In the Contact List Search pop-up window [28], a portion of the address or
name, the Action to Accept, Drop or Hold, and the Phase of the contact can be
entered; it is not necessary to enter all three. Once the information has been
entered, click the Set Search button, and the screen will display the results of
the custom filter request. If an expected contact does not display, reduce the
requirements in the custom filter.

PA G E 2 4
SENDIO A D M I N I S T R AT I O N M A N U A L

[29] Admin > System > Contacts >


Actions... Menu

SECTION 5: SYSTEM >


[30] Import System Contacts Window

CONTACTS
[31] System Contact Import CSV File
Structure

PA G E 2 5
A D M I N I S T R AT I O N M A N U A L SENDIO

System > Contacts > Actions Options

The button opens a drop-down menu as shown


in Figure [29].

The New Contact action provides the same function as the


button described above.

Import Contacts
The Import Contacts action opens a window, shown in Figure
[30], which guides you through the process of importing a
set of contacts from an external source. Three formats are
supported:
▪▪ Comma Separated Value (CSV) [32] Export System Contacts Dialog

▪▪ vCard 2.1 and vCard 3.0 from Lotus Notes 6


▪▪ Structured Text exports from Lotus Notes 5
SECTION 5: SYSTEM >

These contacts can be from an MS Exchange database or other


email system, an enterprise CRM system such as Oracle or SAP,
CONTACTS

or from any other contact database.

[33] Exported System Contacts

[34] Alert Dialog

[35] System > Inbound Control General Group

PA G E 2 6
SENDIO A D M I N I S T R AT I O N M A N U A L

The CSV file must be structured in a specific format, shown in Figure [31]. An
example is viewable by clicking on the word “here” in the pop-up window
instructions.
In the import window, click the Browse… button to specify the CSV file to
import. Select whether the imported contacts are to be configured as Pre-User
or Post-User, and then click the Import button. All imported contacts will be
added to the System Accept-List.

N OTE: When exporting a contact list from MS


Outlook, accept all the defaults in the export
action. The resulting file will be in the correct
format for import into the Sendio system.

T ROUBLESHOOTING TIP: An import will be


unsuccessful if there is no header row as
indicated in the example file. The columns can
be in any order.

SECTION 5: SYSTEM >


INBOUND CONTROL
Export All Contacts

[36] System > Inbound Control Attachment Control Group

PA G E 2 7
A D M I N I S T R AT I O N M A N U A L SENDIO

The Export All Contacts action executes


a process to write all of the contacts to a
CSV file, readable by MS Excel and other
applications. A dialog box shown in Figure [32]
opens, where you specify what to do with the
exported file. A portion of an exported file is
also shown in Figure [33].

Edit Selected Contact


Select a record to edit by clicking the record
or the check box next to the record number.
Then click Actions... Edit Selected Contact.
Only one contact can be edited at a time. If
more than one record is selected, an Alert
dialog box will be displayed as shown in
Figure [34].

[37] Attachment Configuration Pop-up


Delete Selected Contacts Window
The Delete Selected Contacts action causes all of the records that have been
SECTION 5: SYSTEM >

selected (by clicking their check box) to be removed. If a contact is removed,


INBOUND CONTROL

and a message is subsequently received from that address, the sender will
receive an SAV message.

THE SYSTEM > INBOUND CONTROL PAGE


The Admin > System > Inbound Control page displays a list
of options that specify how Sendio should process inbound
messages. These options are grouped by related functions. Figure
[35] shows the General group.

General
Maximum Recipient Count: (Default: Unlimited) Specifies the
combined number of addresses that are allowed to be in the ‘To:’, [38] Additional File Extension and
‘CC:’ and ‘BCC:’ fields in an inbound message. MIME Types

Exceeded Recipient Count Policy: (Default: Hold) Allows the Administrator to


determine the disposition of a message that violates the maximum value set in
the option above. Choices for this value are Hold and Reject.
Maximum Message Size (MB): (Default: Unlimited) Messages can be limited by
the size of the message. This includes the attachment. This value is indicated in
megabytes from 1 to 50.
Exceeded Message Size Policy: (Default: Hold) Allows the Administrator to
determine the disposition of a message that violates the maximum value set in
the option above. Choices for this value are Hold and Reject.

Attachment Control
Figure [36] shows the Attachment Control options group.
Attachment Control specifies how attachments to messages are to be handled
by Sendio. By default, Attachment Control is Disabled, meaning all attachments
from valid/verified senders to known recipients are passed through the system.
The Administrator must specify which attachment types to process, and
whether to Hold or Reject an Untrusted attachment.

PA G E 2 8
SENDIO A D M I N I S T R AT I O N M A N U A L

Clicking on the button opens the Attachment Configuration


window, shown in Figure [37].
Attachments are classified into two groups: File Extensions and MIME Types.
In each group, specific attachment types can be assigned to the Trusted List,
the Unassigned List, or the Untrusted List. Different processing actions can be
specified for each List. By default, all types start as Unassigned.
Attachment types are moved between lists by clicking on the name to highlight
it, and then clicking one of the arrows to move it to a different list.
Modifications in the Attachment Configuration window are effective as soon as
they are made.

N OTE: To move an Extension or Type from th


to the Untrusted List directly, click the fa
hand arrow.

[39] Admin > System > Inbound Control Sender IP Address Groups
Once the attachments are
classified, the handling policies are then set. The defaults are Hold for types on
the Untrusted Lists and Allow for the rest of the attachment types.

SECTION 5: SYSTEM >


INBOUND CONTROL
W ARNING: Making these modifications during peak
business hours may impact system performance for a
brief period.

Sendio recognizes hundreds of file extensions and MIME types. [38] A set
of commonly used extensions and MIME Types is pre-populated into the

Unassigned Lists. Clicking on the buttons allows other


extensions and MIME types to be added for policy management purposes.

Address Validation
The Address Validation group includes three options that are part of the basic
email integrity workflow described in the beginning of this manual.
Unknown Recipient Address: (Default: Reject) Indicates what should be done
with messages that have unknown recipients. If the value is set to Reject
(recommended), then messages with invalid recipient addresses are dropped
by Sendio and will not tax the MTA and IT infrastructure with unnecessary
traffic. If the value is set to Allow, then unrecognized email is sent to the MTA.
There are many potential side effects of this configuration, including allowing
spam to pass through to retired email addresses that still exist on the MTA.
Sender’s Domain Lacks MX: (Default: Defer) Indicates what to do with
messages that don’t have a DNS MX record for the sending address domain.
Options for this option are Allow, Defer and Reject.
Sender Domain Lookup Error: (Default: Defer) Indicates what to do with
messages where a DNS returns an error when looking up the sending address
domain. Options for this option are Allow and Defer.

PA G E 2 9
A D M I N I S T R AT I O N M A N U A L SENDIO

[40] System > Inbound Control Anti-Virus, Zero-Hour


and Bulk Groups

Sender IP Address
Sendio always attempts to determine the IP address of the sender of a
message. This information is used by a number of services, including SPF
SECTION 5: SYSTEM >
INBOUND CONTROL

checking and Contact checking.


If there is a proxy system in front of Sendio, proxy addresses must be specified
via the Admin > System > Options > Proxy Identifiers option or else the Sender
IP Address will not be determined properly.
Sender IP Address Unknown: (Default: Allow) Specifies the action Sendio is
to take if the Sender IP Address cannot be determined for a message. Other
options are Hold and Reject. If the Sender IP Address cannot be determined, all
Services that rely on this information will be bypassed by Sendio workflow.
Sender IP Address Bad Reputation: (Default: Hold) Specifies the action
Sendio is to take if the Sender IP Address Reputation indicates a 90% or
higher likelihood of being spam. This service is only availalbe when using the
Commtouch Zero Hour package.
IP Reputation Service Outage: (Default: Allow) Specifies the action Sendio is to
take if the Sender IP Address Bad Reputation is not functioning or running

N OTE: The IP address of a message “sender” in this context can be a


confusing concept. Frequently, a message sent from an email client
passes through a number of intermediate email handling systems
before it reaches the edge of your (receiving) network. Typically,
Sendio is the initial receiving system, unless there is a proxy in front.
In either case, the “sender” of the message from the perspective
of Sendio workflow is the IP address of the last external system the
email message passed through before it was received by Sendio (or
the proxy).

N OTE: If a proxy is specified, but some email is received by Sendio


without passing through the proxy, this is a network mis-
configuration and will confuse Sendio message processing.

PA G E 3 0
SENDIO A D M I N I S T R AT I O N M A N U A L

Anti-Virus
Sendio includes two distinct services for providing anti-virus protection:
traditional signature-based scanning for “known” viruses and a “zero-hour”
“recurrent pattern detection” (RPD) technology (licensed from Commtouch)
that helps identify outbreaks of previously unknown viruses.
The next two groups on the Admin > System > Inbound Control page, shown in
Figure [40], configure policies for the anti-virus services. The policy choices are
Reject, Hold and Allow. The icons on the left of these options are used within
the Inbound and Outbound message queue displays to signify the disposition of
the message.
Virus Infected: (Default: Reject) Inbound messages that have been determined
to have a virus should be rejected. An SMTP 550 message rejection will be sent
to the sender indicating that the message was not accepted due to a virus in
the content. It is STRONGLY RECOMMENDED that this value be set to Reject
unless there is an anti-virus mechanism elsewhere in the messaging stream.
The corresponding icon is a black square with a white “V” .
Virus Suspected: (Default: Allow) The action for Inbound messages that are
suspected to have a virus in the payload defaults to Allow, indicating that the
message will be sent through to the next point in the messaging stream. The

SECTION 5: SYSTEM >


INBOUND CONTROL
corresponding icon is a red square with a black “V” .
Virus Unscannable: (Default: Allow) The action for Inbound messages that
are “unscannable” defaults to Allow, indicating that the message will be sent
through to the next point in the workflow. An unscannable message is one that
is encrypted or password protected. The corresponding icon is a yellow square
with a black “U” .
Anti-Virus Service Outage: (Default: Defer) If the anti-virus service is
unavailable for a period of time, incoming messages can either be deferred until
the protection resumes or can be forwarded on without anti-virus scanning.

W ARNING: If there are no other means of checking for virus infections


downstream of Sendio in the messaging path (such as email server-
based or desktop client-based), then it is strongly recommended
that message delivery be Deferred until the anti-virus service is
restored.

Zero-Hour
When a new virus is released, one characteristic is typically to try to multiply
and spread as quickly as possible before the anti-virus vendors identify the
“signature” of the new virus and update their databases. Using Recurrent
Pattern Detection (RPD), this rapid propagation can frequently be identified and
measures can then be taken. This concept is known as “zero-hour” or “zero-
day” protection, since it attempts to provide protection from “time zero” (when
a new virus is released) until the virus is identified and blocked with signature
scanning.
Zero-Hour technology has been proven effective at limiting the scope of new
virus outbreaks.
Zero-Hour: (Default: Reject) The action for Inbound messages that have
been scanned and determined to have a Zero-Hour infection should be set to
Reject. Zero-Hour infections are those viruses that are in the early hours of
dissemination prior to the virus signature databases being updated.

PA G E 3 1
A D M I N I S T R AT I O N M A N U A L SENDIO

[41] Admin > System > Inbound Control DKIM Inbound


and SPF Groups
SECTION 5: SYSTEM >
INBOUND CONTROL

Zero-Hour Service Outage: (Default: Defer) If the Zero-Hour anti-virus service


is unavailable for a period of time, messages can either be deferred until the
protection resumes or can be forwarded on without scanning.

Bulk
Recurrent Pattern Detection (RPD) used in the Zero-Hour anti-virus service also
provides a facility to “tag” certain messages that, while not malicious as in a
true virus, are being sent in large volumes across the Internet. These messages
are sometimes referred to as “bulk” mailings. Examples are email newsletters to
large distribution lists or press releases to many recipients.
Sendio uses the “bulk tags” to classify certain messages in the Inbound Pending
Queue and displays them in a secondary Show Bulk view, since they are often
deemed to be “less desirable”.
Bulk Tagging Service Outage: (Default: Allow) Specifies how Sendio should
process messages if the Bulk Tagging Service is unavailable for a period of time.
The default is Allow.

ANTI-SPOOFING STANDARDS
The final three groups on the Admin > System > Inbound Control page [41]
provide controls for configuring two international standards for defeating
attempts by criminals to send unwanted email messages that pretend to be
from a legitimate source. This type of email attack is known as “spoofing”.
Sendio supports both the “DomainKeys Identified Mail” (DKIM) and “Sender
Policy Framework” (SPF) techniques for identifying “spoofed” messages.
These settings define how Sendio handles incoming messages that incorporate
either SPF or DKIM certification. (Configuring Sendio to certify outbound
messages is described in the Admin > System > Outbound Control section.)

PA G E 3 2
SENDIO A D M I N I S T R AT I O N M A N U A L

DKIM Inbound
At the System level, the Administrator specifies whether DKIM is going to
be used overall, for either inbound or outbound messages, or both. Actual
configuration of DKIM options is done at the Domain level. DKIM concepts are
described in more detail in Section 8: Domains Pages and Section 12: DKIM
Primer.
DKIM Signature Checking: (Default: Enabled) DomainKeys Identified Mail
provides a mechanism for verifying the authenticity of an email. In a DKIM
email header, there will be a signature associated only with the domain or sub-
domain of the sender. The Administrator may enable DKIM Signature Checking
which will verify this signature and place an indication of the status of the check
in the header of the email.
DKIM Signature Bad: (Default: Allow) If a DKIM signature is determined to be
bad as a result of the check, the administrator may configure Sendio to Reject,
Hold or Allow the message. The default value for this option is Allow, which will
send the message through to the next step in the workflow even though the
DKIM checking has failed.
DKIM Signature Lookup Error: (Default: Allow) DKIM is dependent on DNS
access. In the event that there is an issue with accessing the DKIM (TXT) record

OUTBOUND CONTROL
SECTION 5: SYSTEM >
via DNS, this option will dictate the action to be performed. The default is
to Allow the message through in the event that the DKIM process cannot be
performed.

DomainKeys Inbound
DomainKeys is a proprietary technology that preceded DKIM. It is used by a
small number of companies, but has legacy value to certain organizations. All
current installations of DomainKeys are being replaced by DKIM.
DomainKeys Signature Checking: (Default: Enabled) Sendio can be configured
to check for DomainKeys and verify the validity of the key. The results of the
check are in the delivery headers, but the Administrator cannot enact any policy
against the result.

SPF
Sender Policy Framework is a Microsoft-led standard for email anti-spoofing.
For further information on SPF, please consult www.openspf.org. The
implementation of an SPF record is highly recommended.

PA G E 3 3
A D M I N I S T R AT I O N M A N U A L SENDIO

SPF Checking: (Default: Disabled) Indicates whether or not Sendio will examine
the SPF (Sender Policy Framework) record of an incoming message domain.
If the value Enable is chosen, then there are several subordinate actions that
can be taken based on the level of SPF failure (‘fail’, ‘softfail’, ‘temperror’ or
‘permerror’). The actions based on the level of SPF failure span Allow, Hold,
Defer and Reject.
SPF ‘fail’: (Default: Allow) The sending email server is not authorized to send
messages for the domain in question. Available options are Allow, Hold and
Reject. This generally means the SPF record is followed by a -ALL.
SPF ‘softfail’: (Default: Allow) The sending email server is not authorized to
send messages for the domain in question but the domain owner has not
explicitly restricted other servers from sending messages for the domain
in question. Setting this value to Hold will allow you to review the message
manually in more detail before deciding how to proceed. This generally means
the SPF record is followed by a ~ALL.
SPF ‘temperror’: (Default: Allow) A temporary error occured during the SPF
check. As such a determination of the SPF records could not be made. Setting
this value to Defer will cause Sendio to retry the SPF check when message
delivery is retried by the sending server.
OUTBOUND CONTROL
SECTION 5: SYSTEM >

SPF ‘permerror’: (Default: Allow) A permament error occured during the SPF
check. This is very likely due to an incorrect SPF record for the sending domain.
Available options are Allow and Reject.

N OTE: If you have an active proxy in front of Sendio, then INBOUND


PROXIES on the Admin > System > Options page MUST be specified.
Sendio can perform SPF checking behind a proxy by setting these
additional Proxy Options.

N OTE: If desired, specific sending domains can be exempted from


Sendio. For more information, see the System > SPF Exemption
section of this Admin Guide.

SPF Checking: (Default: Disabled) Indicates whether or not Sendio will examine
the SPF (Sender Policy Framework) record of an incoming message domain.
If the value Enable is chosen, then there are several subordinate actions that
can be taken based on the level of SPF failure (‘fail’, ‘softfail’, ‘temperror’ or
‘permerror’). The actions based on the level of SPF failure span Allow, Hold,
Defer and Reject.
SPF ‘fail’: (Default: Allow) The sending email server is not authorized to send
messages for the domain in question. Available options are Allow, Hold and
Reject. This generally means the SPF record is followed by a -ALL.

PA G E 3 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SPF ‘softfail’: (Default: Allow) The sending email server is not authorized to
send messages for the domain in question but the domain owner has not
explicitly restricted other servers from sending messages for the domain
in question. Setting this value to Hold will allow you to review the message
manually in more detail before deciding how to proceed. This generally means
the SPF record is followed by a ~ALL.
SPF ‘temperror’: (Default: Allow) A temporary error occured during the SPF
check. As such a determination of the SPF records could not be made. Setting
this value to Defer will cause Sendio to retry the SPF check when message
delivery is retried by the sending server.
SPF ‘permerror’: (Default: Allow) A permament error occured during the SPF
check. This is very likely due to an incorrect SPF record for the sending domain.
Available options are Allow and Reject.

N OTE: If you have an active proxy in front of Sendio, then INBOUND


PROXIES on the Admin > System > Options page MUST be specified.
Sendio can perform SPF checking behind a proxy by setting these
additional Proxy Options.

N OTE: If desired, specific sending domains can be exempted from

SECTION 5: SYSTEM > SSL


Sendio. For more information, see the System > SPF Exemption
section of this Admin Guide.

THE SYSTEM > OUTBOUND CONTROL PAGE

[42] System > Outbound Control Page

PA G E 3 5
A D M I N I S T R AT I O N M A N U A L SENDIO

Address Validation
Unknown Sender Address: (Default: Reject) Specifies the policy that Sendio
should follow if an out-going message is received from the internal email server
with an unknown sender’s address. This could be a sign of a compromised
email server.
Recipient’s Domain Lacks MX: (Default: Defer) Specifies the policy that
Sendio should follow if an out-going message includes a recipient whose
domain does not have an MX record. In a Microsoft Exchange environment it
is recommended to set this option to Allow due to the way Exchange utilizes
Queues when sending email.
Recipient Domain Lookup Error: (Default: Defer) Specifies the policy that
Sendio should follow if the target domain for out-going message cannot be
verified via DNS. In a Microsoft Exchange environment it is recommended to
set this option to Allow due to the way Exchange utilizes Queues when sending
email.

Anti-Virus & Zero-Hour


The Anti-Virus and Zero-Hour options specify the actions to take if an out-going
SECTION 5: SYSTEM > SSL

message is found to contain a virus or potential virus, and what policies to


follow if either the Anti-Virus or Zero-Hour services are unavailable. Refer to the
Anti-Virus and Zero-Hour discussions in the Admin > System > Inbound Control
section for details.

DKIM Outbound
DKIM Signing: (Default: Disabled) Specifies whether Sendio is to sign out-going
messages with DKIM certificates. The specific configuration of DKIM options is

done at the Domain level, accessed via the button on the Admin
navigation menu.

PA G E 3 6
SENDIO A D M I N I S T R AT I O N M A N U A L

The configuration options on the Admin > System > Outbound Control page in
Figure [42] mirror many of the corresponding options on the Admin > System >
Inbound Control page previously described. The Outbound Control establishes
criteria to minimize the potential of sending out a compromised message that
could harm a recipient’s environment. As with the Inbound Controls, options
are organized into groups.

General
Maximum Destination Count: (Default: Unlimited) Specifies the combined
number of addresses that are allowed to be in the ‘To:’, ‘CC:’ and ‘BCC:’ fields in
[43] Admin > System > SSL Certificate an outbound message.
Name Drop-Down Menu
Maximum Message Size (MB): (Default: Unlimited) Specifies the maximum
allowable size, including attachments, for an out-going message.

Attachment Control

SECTION 5: SYSTEM >


SILVERLIST

[44] System > SSL Page

PA G E 3 7
A D M I N I S T R AT I O N M A N U A L SENDIO

The certificate request process requires that you provide the Certificate
Authority (CA) with a Certificate Signing Request (CSR). The process is as
follows:
▪▪ A CSR is generated within the Sendio web server software, and
contains both the public key portion of your web server’s key pair
and the Distinguished Name, which is derived from the organizational
information requested. The generation of a CSR also includes the
generation of a server key pair. It is strongly recommended that you
back up the key pair. The key pair cannot be recovered if lost.
▪▪ Submit the key for signature
▪▪ Upload the signed certificate
▪▪ Select Signed by Trusted Authority from the Certificate Name drop-
down menu [44]

N OTE: The certificate must be in base64 format for Sendio to accept and
recognize it.

In order to convert a binary certificate to base 64 in Windows, do the following:


SECTION 5: SYSTEM >

▪▪ Open the certificate in Windows Explorer


SILVERLIST

▪▪ Select the “Details” tab


▪▪ Click the “Copy to File...” button
▪▪ Select “Base-53 encoded X.509 (.CER)” as the file format
The resulting file may then be uploaded to Sendio.

N OTE: SSL certificates that require an intermediate certificate or a


certificate chain may require the assistance of Sendio Support. An
example of this would be GoDaddy.com certificates.

PA G E 3 8
SENDIO A D M I N I S T R AT I O N M A N U A L

Attachment Checking: (Default: Disabled) Specifies whether there is to be policy


checking for attachments to out-going messages. If Enabled, an Administrator
must use the button to open the definition page and specify
which attachment types are allowed to go out and which are prohibited from
being sent. Refer to the Attachment Control discussion in the Admin > System >
Inbound Control section for details.
Unassigned Attachment Policy: (Default: Trusted) If Attachment Checking is
Enabled, and some attachment types are left in the Unassigned category, this
option specifies whether Unassigned types are Trusted or Untrusted.

Address Validation
Unknown Sender Address: (Default: Reject) Specifies the policy that Sendio
should follow if an out-going message is received from the internal email server
with an unknown sender’s address. This could be a sign of a compromised email
server.
Recipient’s Domain Lacks MX: (Default: Defer) Specifies the policy that Sendio
should follow if an out-going message includes a recipient whose domain does
not have an MX record. In a Microsoft Exchange environment it is recommended
to set this option to Allow due to the way Exchange utilizes Queues when sending

SECTION 5: SYSTEM >


email.

SILVERLIST
Recipient Domain Lookup Error: (Default: Defer) Specifies the policy that Sendio
should follow if the target domain for out-going message cannot be verified via
DNS. In a Microsoft Exchange environment it is recommended to set this option to
Allow due to the way Exchange utilizes Queues when sending email.

Anti-Virus & Zero-Hour


The Anti-Virus and Zero-Hour options specify the actions to take if an out-going
message is found to contain a virus or potential virus, and what policies to follow
if either the Anti-Virus or Zero-Hour services are unavailable. Refer to the Anti-
Virus and Zero-Hour discussions in the Admin > System > Inbound Control section
for details.

DKIM Outbound
DKIM Signing: (Default: Disabled) Specifies whether Sendio is to sign out-going
messages with DKIM certificates. The specific configuration of DKIM options is

[45] System > SilverList Page

PA G E 3 9
A D M I N I S T R AT I O N M A N U A L SENDIO

To add a SilverList table entry, click the button to


open the pop-up window shown in Figure [46].
Enter the Name and email information. The Name is used for
display purposes only.
While an IP address entry is not required, it is strongly
advised that one is specified to provide further assurance
that the sending domain is coming from the appropriate IP
address. Note, however, that if the IP address of the domain
changes, then this entry will need to be modified to reflect the [46] Admin > System > SilverList > New
Create Entry Pop-up Window
change
SilverList entries may also be exported and imported in much

the same fashion as contacts by clicking on the


button [47]. Export SilverList... opens a widow as shown in
Figure [48].

N OTE: SilverListing does not function behind a proxy.


Consequently, the contents of the SilverList tab will
be unavailable when the proxy function is enabled,
[47] Admin > System > SilverList > Actions
Drop-Down Menu
SECTION 5: SYSTEM >

as shown in Figure [49].


SILVERLIST

N OTE: Administrators will see a SilverList tab on their User


> Account Info page. Users without administrative
rights will not see this tab.

[48] Admin > System > SilverList > Actions


Export Pop-up Window

[49] SilverList and Incoming Proxy Message

PA G E 4 0
SENDIO A D M I N I S T R AT I O N M A N U A L

done at the Domain level, accessed via the


button on the Admin navigation menu.

THE SYSTEM > SSL PAGE


It is recommended that User access to the Sendio web
interface be made over an SSL connection. The SSL
certificate can be a Sendio default, or can be specified via
the options on the Admin > System > SSL page [44].
Certificate Name: (Default: Sendio, Inc.) Specifies the
name of the SSL certificate to use for secure access to the
Sendio web interface. The three options are shown in the
drop-down list, in Figure [43].

N OTE: Self-Signed and Signed by Trusted Authority certificate names


should not be selected unless a certificate has already been
uploaded.

HTTPS/SSL access only: (Default: No) Specifies whether

SECTION 6: GLOBAL VIEWS


users must utilize an SSL connection to access the Sendio
web interface. If enabled, access will not be possible
without https://.
HTTPS/SSL port: This option is fixed to port 443.
The certificate request process requires that you provide
the Certificate Authority (CA) with a Certificate Signing
Request (CSR). The process is as follows:
▪▪ A CSR is generated within the Sendio web
server software, and contains both the public
key portion of your web server’s key pair and
the Distinguished Name, which is derived from
[50] Pop-up for Entering Domain and IP Address the organizational information requested. The
generation of a CSR also includes the generation
of a server key pair. It is strongly recommended
that you back up the key pair. The key pair cannot
be recovered if lost.
▪▪ Submit the key for signature
▪▪ Upload the signed certificate
▪▪ Select Signed by Trusted Authority from the
Certificate Name drop-down menu [44]

N OTE: The certificate must be in base64 format for


Sendio to accept and recognize it.

PA G E 4 1
A D M I N I S T R AT I O N M A N U A L SENDIO

In order to convert a binary certificate to base 64 in


Windows, do the following:
▪▪ Open the certificate in Windows Explorer
▪▪ Select the “Details” tab
▪▪ Click the “Copy to File...” button
▪▪ Select “Base-53 encoded X.509 (.CER)” as the file
format
The resulting file may then be uploaded to Sendio.

N OTE: SSL certificates that require an intermediate


certificate or a certificate chain may require the
assistance of Sendio Support. An example of this
would be GoDaddy.com certificates.

THE SYSTEM > SILVERLIST PAGE


SECTION 5: SYSTEM >

Sendio SilverListing service is an enhanced implementation


of an anti-spam technique commonly known as
SILVERLIST

“greylisting.” The basic concept is that most spam-


sending systems are optimized for maximum output
only. In contrast, all commercial email servers, such as
MS Exchange, Lotus Notes or Novell GroupWise, support
all SMTP components for both inbound and outbound
message flow.
The SilverListing process is combined with the Contact
Checking process to provide a highly effective spam
management mechanism. SAV messages will be sent
to only those sending systems that are Established as
identified by the SilverList process. The SilverList function
will not be performed for those contacts and IP addresses
that are already on an Accept-List.
With the SilverList service of Sendio enabled, when a
request-to-send email initiation message is received from
an email server with a previously unknown IP address,
Sendio writes the IP address to a SilverList with a status
of Waiting and then does not acknowledge the sending
servers request. Per the SMTP protocol, after a short
period of time a legitimate email server would decide that
the initial request had been lost somewhere in transit
across the Internet, and would resend the request-to-
send message. In contrast, spam-sending systems will not
resend the request and will simply move on to send the
next spam message somewhere else.
If Sendio never receives a second request-to-send from the
Waiting IP address, then it is presumed that the sender is
a spammer and the IP address is ultimately dropped from
the SilverList. No actual email content is ever received by
Sendio. In contrast, if a second request-to-send message is
received, then the IP address on the SilverList is updated to
a status of Established and the standard SMTP transaction

PA G E 4 2
SENDIO A D M I N I S T R AT I O N M A N U A L

proceeds. This process has the effect of blocking a very


large percentage of the spam that attempts to get through
Sendio.
In addition, Sendio checks whether a subsequent sender’s
IP address is already on the SilverList with an Established
status and, if it is, the system skips the Waiting process and
simply proceeds with the SMTP transaction.
The Admin > System > SilverList page, shown in Figure
[45], displays a table of addresses that have been manually
entered by an Administrator as permanent entries on
the SilverList. Any messages from these addresses skip
the SilverListing process. Addresses that are “learned” by
becoming Established dynamically are listed on SilverList
tables at the individual User Accounts level.

To add a SilverList table entry, click the button to


open the pop-up window shown in Figure [46].
Enter the Name and email information. The Name is used
for display purposes only.

SECTION 6: GLOBAL VIEWS


While an IP address entry is not required, it is strongly
advised that one is specified to provide further assurance
that the sending domain is coming from the appropriate
IP address. Note, however, that if the IP address of the
domain changes, then this entry will need to be modified
to reflect the change
SilverList entries may also be exported and imported in
much the same fashion as contacts by clicking on the
button [47]. Export SilverList... opens a
widow as shown in Figure [48].

N OTE: SilverListing does not function behind a


proxy. Consequently, the contents of the
SilverList tab will be unavailable when the proxy
function is enabled, as shown in Figure [49].

N OTE: Administrators will see a SilverList tab on


their User > Account Info page. Users without
administrative rights will not see this tab.

PA G E 4 3
A D M I N I S T R AT I O N M A N U A L SENDIO

THE SYSTEM > SPF EXEMPTION PAGE


If your Sendio service is running the Sendio Version 7
or Version 8 software, you have access to the System >
SPF Exemptions page. This page lets you enter sending
domains and IP addresses of specific senders that you want
to exempt from the SPF checking features you may have
enabled in System > Inbound Control.
The most common use of this feature is to avoid situations
where a sending domain that your organization trusts has
a misconfigured SPF record that causes Sendio to hold the
incoming emails from the domain in an “Admin Hold” state
due to the SPF check failing.
For example, a domain called foo.com may have the
following SPF record published in DNS:
foo.com. 3600 IN TXT “v=spf1
include:spf.protection.outlook.com -all”

However, the domain foo.com may send certain emails


from outside the Microsoft Outlook365 network. For
SECTION 5: SYSTEM >

example, some emails may originate directly from their


website server but they have forgotten to include the web
SILVERLIST

site server’s IP address in the SPF record. By entering an


exemption for foo.com, SPF checking will continue to be
applied to all senders, except foo.com.
To enter an exemption, click the New button in the SPF
Exemption tab to display the pop-up in Figure [50]. To
exempt a domain, enter the domain name in the Domain
field. The IP field allows you to specify a single sending
IP address. This field is optional and can be left blank. It
allows you to exempt only a single sending IP address
from SPF checks. Use this field if you know for certain the
sending IP address that was accidentally removed from
the SPF record. To exempt multiple IP addresses, create
multiple exemptions for the same domain, with a different
IP address specified for each exemption. IP address ranges
are not supported at this time.
If the sending domain has many subdomains, you can have
one exemption for the domain (foo.com) and a separate
exemption for all subdomains using the asterisk (*) as
a wildcard character. For all foo.com subdomains, for
example, you would enter *.foo.com as the domain.
Although less common, you can enter an IP address for an
exemption in the IP field and leave the Domain field blank.
This feature is useful if a specific organization that you are
trying to exempt has many different sending domains from
a single server and he case it may be easier to just have an
IP address exemption.

PA G E 4 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 6: GLOBAL VIEWS PAGES

The pages on the Admin Menu gives Administrators a facility


to see an aggregate view of the various message queues for all users. Many
Administrators find a Global View of all Held messages to be particularly useful.
Most held messages will be a result of specific policy that has been enabled on
the Admin > System >Inbound Control and Outbound Control pages.
A Global View displays a table of messages across all accounts that Sendio
recognizes. In this way the Administrator can view messages with specific
characteristics across all accounts. The view can assist in determining the
effectiveness of a policy or potentially the requirement of an additional policy.

Because the Global Views function performs comprehensive


queries across the entire Sendio database, it can have
significant impact on system performance. When the

button on the Admin menu is selected, the

SECTION 6: GLOBAL VIEWS


GUI first displays an Alert to remind the Administrator about
this potential impact [51].

[51] Admin > System > Global Views Warning Message

After closing the Alert window, the Administrator then selects


either the Admin > Global Views > Inbound Messages or the
Outbound Messages tab, shown in Figure [52].
[52] Admin > System > Global Views Tabs

Clicking the button opens a drop-down menu


for each tab that lists the various view options, as shown in
Figures [53] and [54].
When a particular View is selected, the corresponding table is
displayed. An example is shown in Figure [57].

[53] Global Views > Inbound Messages View Options

[54] Global Views > Outbound Messages View Options

PA G E 4 5
A D M I N I S T R AT I O N M A N U A L SENDIO

Because the Global Views function performs


comprehensive queries across the entire Sendio database,
it can have significant impact on system performance.

When the button on the Admin menu


is selected, the GUI first displays an Alert to remind the
Administrator about this potential impact [51]. [55] Global Views > Inbound
Messages > Actions Drop-Down
Menu
After closing the Alert window, the Administrator then
selects either the Admin > Global Views > Inbound
Messages or the Outbound Messages tab, shown in Figure
[52].

[56] Global Views > Outbound


Clicking the button opens a drop-down menu Messages > Actions Drop-Down
Menu
for each tab that lists the various view options, as shown in
Figures [53] and [54].
When a particular View is selected, the corresponding
SECTION 6: GLOBAL VIEWS

table is displayed. An example is shown in Figure [57].

If one or more messages in a Global Views table are


selected (by clicking the check boxes), a number of Actions

can be taken by selecting from the button


drop-down lists, as shown in Figures [55] and [56].

[57] Global View of Pending Messages, No Bulk

PA G E 4 6
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 7: DIRECTORIES PAGES

The page on the Admin menu displays a table of all the


directories and / or Organizational Units (“OUs”) that contain the mail
recipient information. An example is shown in Figure [58]. Sendio is capable of
synchronizing with multiple directories.
In order to synchronize with a directory, a username must be created on the
directory. This username requires only basic (or “read-only”) rights with a
password that is set to “never expire”.
Sendio can be set to synchronize with a Directory Service automatically. This is
configured through the sysconfig interface, described in the Installation Guide.

CREATING A NEW DIRECTORY


To add a directory, click the button on the Directories page. A pop-up
window will be displayed [58].

SECTION 7: DIRECTORIES
Name: The name Sendio will be used to reference this
directory configuration.
Directory Host: Either the IP address (preferred) or URL to
the Organizational directory. It is recommended that the
primary directory be used in the case of a primary and backup
architecture.

N OTE: A Directory Host URL will work only if Sendio is


set to use the organization’s internal DNS.

Port: This typically points to the Global Catalog which exists


on port 3268. The alternate common setting is port 389 which
indicates an LDAP environment.
[58] Admin > Directories > New
Pop-up Window If the information and connection is successful, clicking on the
button will retrieve the “Domain Names” (DNs) present on the LDAP Directory.
If no DNs are fetched, then the host name / port combination should be verified
as well as the connectivity between Sendio and the Directory server.
Some directories do not provide DNs, so the Administrator must type them in
manually.
The specific OU (Organizational Unit) should be pre-pended to the Base DN to
specify the location of the Users with mail attributes.

[59] Admin > Directories Page

PA G E 4 7
A D M I N I S T R AT I O N M A N U A L SENDIO
SECTION 7: DIRECTORIES

PA G E 4 8
SENDIO A D M I N I S T R AT I O N M A N U A L

EXAMPLE ou=users, dc=example, dc=com

Once the connectivity has been established, enter the Login


and Password and select the Directory Type from the drop-
down menu as shown in Figure [60].

Click the button to save the new Directory


definition.

[60] Admin > Directories > New


Directory Type Drop-Down Menu

SECTION 7: DIRECTORIES
MODIFYING AN EXISTING DIRECTORY
DEFINITION
Double-click on a Directories table row, or click the record
[61] Admin > Directories > Actions
Drop-Down Menu check box, press and choose Open Selected
Directory [61]. Modify the record as appropriate and save the
changes.

MANUALLY SYNCHRONIZING
DIRECTORIES
Select one or more Directories by clicking on the respective
check boxes.
Select Synchronize Selected Directories from the
menu. The synchronization screen in Figure [62]
will be displayed, indicating new addresses and accounts that
have been added to Sendio.

W ARNING: Email for recipient addresses that are


not synchronized will get bounced back to the
sender. Please ensure that the necessary mail
recipients are within the directory that you have
just synchronized, and the domain to which the
addresses belong is in the list of Domains (see
Section 8: Domains Pages).
[62] Directory Synchronization

PA G E 4 9
A D M I N I S T R AT I O N M A N U A L SENDIO

ACTIVE DIRECTORY OBJECTS


The users that are imported are those with a mail attribute
within Active Directory. Inactive accounts that have not
been deleted from Active Directory will also be imported.
Groups, mail enabled folders, and distribution lists are
treated in the same fashion as any other account from an
Sendio perspective.
If a group or distribution list is mail enabled all messages
that are delivered to this account will be distributed to all
members of the Distribution List by the internal Exchange
server.
Sendio is perfectly capable of recognizing and processing
messages for mail enabled Public Folders.
When accounts are deleted from Active Directory they are
NOT deleted from Sendio. Active Directory accounts which
have been deleted will be noted by a red X on the Accounts
page. If the Active DIrectory account is truly no longer in
use you will need to manually purge the account from
Sendio.

PA G E 5 0
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 8: DOMAINS PAGES


Sendio can provide email integrity services to multiple email domains
simultaneously.

EXAMPLE
Frank owns 4 companies, each with their own IT infrastructure and
email system.
▪▪ franks-flowers.com
▪▪ franks-fish.com
▪▪ franks-farm-feed.com
▪▪ franks-furniture.com

One Sendio instance can receive all of the email for all four businesses,
process the messages through the email integrity workflow (with
distinct policies if desired), and then forward the legitimate messages
on to the appropriate email server at the correct company.

SECTION 8: DOMAINS
Domains are managed by selecting the button on the Admin
navigation menu. When the Domains pages open, the display shows all of the
currently configured domains in a table, as shown in Figure [63].

CREATING A NEW DOMAIN


Clicking the button displays the Create New Domain
pop-up window. [63]
Name: The fully qualified domain name (e.g., sendio.com or
sendio.net)
Clicking the Create anti-spoofing drop contact for this domain
check box causes the system to automatically add a contact to
[63] Admin > Domains > New Pop-up the System Drop-List, as described in Section 5: System Pages,
Window System Contacts Tab, Creating a New Contact. An example
is shown in Figure [65]. This System Drop Contact prevents
Sendio from accepting spoofed messages from the internal
email domain.

[64] Admin > Domains Page

PA G E 5 1
A D M I N I S T R AT I O N M A N U A L SENDIO

DOMAIN-LEVEL CONFIGURATION
Many of the options described in Admin > System > Options
Pages in Section 5 can be modified at the Domain level.
To access the configuration pages for a specific Domain,
double-click on the record in the Domains table display [64].
Domain configuration pages are a set of tabbed pages. The
default view is of the Details page, which provides some
timestamp information. [66]
Clicking the Options tab displays the Admin > Domains >
Options page list of options. [67]
[65] Anti-Spoofing Drop Contact Auto-
Created in System Drop-List With two exceptions, the options on the Admin > Domains
> Options list are equivalent to the options on the Admin
> System > Options page. The exceptions, for DKIM, are
described later in this section.
When a new Domain is created, it “inherits” the configuration
settings from the System level. If an option is locked at
the System level, the option is “read-only” at the Domain
level. If the System level option is unlocked , then it can be
SECTION 8: DOMAINS

changed at the Domain level if desired.


Clicking the check box for an option that is not “grayed-
out” allows the Administrator to change the setting for that
[66] Admin > Domains Configuration option. It can then be locked if it should not be overridden at
Pages the Account (User) level.

DKIM Signing

N OTE: DomainKeys Identified Mail (DKIM) support is


enabled at the System level for Sendio overall,
but is configured on a per-Domain basis.

Sendio has the capability to “sign” outbound mail. This


functionality provides the potential of significantly reducing
the processing load to the email server.
Sendio can be configured to use DKIM to sign all outgoing
mail, or DKIM signing can be restricted to a domain or an
organization. The third tab on a Domain configuration page
shows the configuration tab for Outbound DKIM Control,
shown in Figure [67].
DKIM signs body and selected parts of header. This feature
will add entries to the envelope header of each email.
Signature is transmitted in this DKIM-Signature header. There
is a Public key stored in DNS or in _domainkey subdomain as
specified in the system options tab. The namespace can be
divided using selectors and it allows multiple keys for aging
and delegation.
A selector is added to the domain name, used to find DKIM
public key information. It is specified as an attribute for a

[67] Admin > Domains Configuration


Options Page

PA G E 5 2
SENDIO A D M I N I S T R AT I O N M A N U A L

DKIM signature, and is recorded in the DKIM-Signature header


field.
Validation uses the selector as an additional name component,
to give differential DNS query names. There are different DKIM
DNS records associated with different selectors, under the
same domain name.

EXAMPLE
[68] Admin > Domains Configuration Jun2009.eng._domainkey.example.com
Outbound DKIM Control Page
Hence, selectors are used to permit multiple keys under the same organization’s
domain name. This can be used to give separate signatory controls among
departments, date ranges, or third parties acting on behalf of the domain name
owner.
The DKIM tab above is the primary location for configuring DKIM signing. There
are five basic steps to the process:
1. On the Domain Options page, set the DKIM Prefix, if necessary. This is
not a required entry.

SECTION 8: DOMAINS
2. On the Domain Options page, choose the selector as shown below.
There is a default selector that is normally chosen.
3. Create a DKIM signature for the selector.
4. Create DNS Entry by first choosing the Selector that will be used.
Click on the pink button to Execute Reset DKIM DNS Script. With the
Selector still chosen, click on the Actions button and select Show DNS
Update Instructions. This will generate a pop-up screen with the DNS
Entry that will be required. In the DNS entry shown below, the public
side of the DKIM key will be displayed and this will be used to match
the private key that Sendio is signing. Note the bolded entry on the
third line below matches the DNS name that is given when the Selector
is created.
; If you’re managing DKIM selectors yourself, insert the following
; TXT records into the BIND zone configuration of sendio.com.
5. Enable DKIM signing from the Outbound Control tab from the System
menu option.
After the above steps have been completed, outgoing mail will be signed with
the generated key (private side) which is required to match the public side of
the key in the zone file.

PA G E 5 3
A D M I N I S T R AT I O N M A N U A L SENDIO

This page intentionally left blank

PA G E 5 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 9: ACCOUNTS PAGES

The button on the Admin menu displays a table of the accounts


that are being managed by Sendio. An example of the Accounts page is shown
in Figure [69]. Prior to deployment, the Administrator should review the list
that has been imported.
There are two icon columns in the Accounts table.

The red X icon indicates users that have been deleted or moved from the
external LDAP directory (i.e., Active Directory, GroupWise, Lotus Notes,
etc.), or removed from the scope of synchronization. These users can be
safely deleted once verified that they were not removed from the directory
in error. While Sendio maintains synchronization with the external LDAP
directory, deletions on Sendio are not reflected in the external LDAP
directory. In other words, the synchronization is in reality a one-way import
and provides a backup in the event that an account is erroneously removed
from the external LDAP directory.

SECTION 9: ACCOUNTS
The gold key icon identifies users that have local passwords to Sendio. This
password is set on either the Admin > Accounts ... Details tab as described
below or on the User > Account Info > Details page.
Double-clicking on an Accounts record
opens a view of that account, as shown
in Figure [69]. The default page shows
the Details of the user. The Details and
Addresses tabbed pages contain the
same information as shown in the User >
Account Info pages.

Local Password
The Accounts ... Detail screen allows
the Administrator to set a local Sendio
password on behalf of the user. In other
words, instead of utilizing a network
password, the user can use the local
password to log in to Sendio. This is
[69] Admin > Accounts Individual Record Tabbed View very useful in the case of a user with an
executive assistant. The assistant can

[70] Admin > Accounts Page

PA G E 5 5
A D M I N I S T R AT I O N M A N U A L SENDIO

be granted a local password to view


the message queue and contacts of the
user without compromising the network
password of the user.

Addresses
The Addresses page shows all of
the addresses associated with the
particular account. [71] If there
are multiple addresses listed, the one with the blue square icon [71] Admin > Accounts ... Addresses
identifies the Primary addresses for the account. This designation may Page
come from an external directory setting, or can be manually set from the

menu, shown in Figure [72].

Primary Address for Account


This is the address where system messages and the Queue
Summary (if enabled) will be sent. This Primary designation
can be overridden by clicking on the Reset... menu option. [72] Admin > Accounts ... Addresses
> Actions Drop-Down Menu
SECTION 9: ACCOUNTS

N OTE: If the address that is designated as the


primary address is removed from the Active
Directory, then the next synchronization will
remove the primary designation and the
system will promote the first address in the list
as primary.

Options
The Admin > Accounts ... Options page allows an Administrator
to configure, for an individual account, the options previously
described for the Admin > System > Options page and the
Admin > Domains ... Options page. [73]
The setting called “Queue Summary Custom Recipient Address
List” is only available within Admin > Accounts .. Options. It
is not available at the System level. With this setting the IT
Administrator can specify an alternate email address to send the
Queue Summary. The two common use cases are:
1) A senior management person wants to easily delegate
monitoring of their Sendio pending queue to an administrative
assistant.
2) For large distribution groups (e.g., info@,sales@), the Queue
Summary can be specified to go to only 1 or a few member of
the group, but not all members.
If you enter two or more email addresses into the “Queue
Summary Custom Recipient Address List” field, separate them
with commas. Any email address you enter must be present in
the “Addresses” section of the Sendio interface. They cannot be
external email addresses such as @gmail.com.
[73] Admin > Accounts ... Options Page

PA G E 5 6
SENDIO A D M I N I S T R AT I O N M A N U A L

Contacts
The Admin > Accounts ... Contacts page
[74] allows an Administrator to see all of
the contacts for a particular account. This
view is equivalent to what a User will see
on the User > Contacts page.

The and buttons


[74] Admin > Accounts ... Contacts Page open drop-down menus as shown in Figures [75] and [76].
The Actions... drop-down menu has a unique option Accept
All Messages From Selected Contacts.

Inbound and Outbound


The Admin > Accounts ... Inbound and Outbound pages allow
an Administrator to see all of the message queues for the
[75] Admin > Accounts ... Contacts View...
Drop-Down Menu account, and perform all of the Actions that a User can do.

SECTION 9: ACCOUNTS
For both pages the view can be changed as shown in figure
[77].

[76] Admin > Accounts ... Contacts Actions...


Drop-Down Menu

[77] Admin > Accounts ... View

PA G E 5 7
A D M I N I S T R AT I O N M A N U A L SENDIO

SilverList
The Admin > Accounts ... SilverList
page allows an Administrator to see the
status of all IP addresses that are being
processed, or have been processed and
Established, by the SilverList service for a
particular account. [78]
The Status column shows the disposition
of the SMTP connection that has come in
to the system. The values in this column
are Established and Waiting.
IP addresses that are Waiting are still
being processed by the SilverList service.
Those that Established have been verified
[78] Admin > Accounts ... SilverList
and passed by the service. Page
The Sendio SilverList database will keep the record for 30
days from the most recent successful connection.
The SilverList table is searchable on the Status entry or by
SECTION 9: ACCOUNTS

creating a custom search from the View... menu. [79]

Add Contact
An Account or System contact can be added directly from [79] Admin > Accounts ... SilverList View...
the SilverList table. Select the entry with the address that Drop-Down Menu

is targeted to be added, click on the button


and select one of the two choices, as shown in Figure [80].

N OTE: Adding the address as a contact in the System


does NOT deliver the message as in the Pending
Queue display.
[80] Admin > Accounts ... SilverList Actions...
Drop-Down Menu

PA G E 5 8
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 10: ADDRESSES PAGES


The Admin > Addresses pages list the addresses that are recognized by Sendio
as valid recipient addresses. Every User, or Account, has at least one Address
associated with it and some have many Addresses.

EXAMPLE
At Frank’s Farm Feed, Frank has his personal address, and is also in
charge of sales and customer service. He has three addresses that
Sendio covers:
▪▪ frank@franks-farm-feed.com
▪▪ sales@franks-farm-feed.com
▪▪ service@franks-farm-feed.com
Frank also has two addresses at Frank’s Furniture:
▪▪ frank@franks-furniture.com
▪▪ sales@franks-furniture.com

SECTION 10: ADDRESSES


In Figure [81], user Anna Cunningham has five addresses associated with her
account. The acunningham@sendio.com record has a blue square icon that
signifies that this address is the Primary address for the account.

[81] Admin > Addresses Page

PA G E 5 9
A D M I N I S T R AT I O N M A N U A L SENDIO

Clicking the button opens the Address List Search


window, shown in Figure [81]. There are several options for
searching for an address, selectable from a drop-down menu,
shown in Figure [83].
[82] Admin > Addresses Address
Search Window

[83] Address Search Window Search


Options
SECTION 10: ADDRESSES

[84] Use Regular Expression Syntax


Check Box

Clicking the button opens a drop-down menu


shown in Figure [85].

[85] Admin > Addresses > Actions...


Drop-Down Menu

PA G E 6 0
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 11: LOGS


Sendio maintains 9 log files that track all message transactions and workflow
processes. The logs can be viewed on the Admin > Logs pages.
▪▪ SMTP: the incoming SMTP transactions through Sendio
▪▪ SMTPS: the secure SMTP transactions between Sendio and remote
servers
▪▪ MTA: the outbound SMTP transactions with mail servers
▪▪ SAV: the Sender Address Verification requests on the system
▪▪ HTTP: users who are accessing the system via the GUI
▪▪ HTTPS: users who are accessing the system via the GUI
▪▪ FTP: the FTP transactions between Sendio and internal hosts
▪▪ Pass-Through: the messages that are not processed using Integrity
Services
▪▪ Auto-Accept: the messages that are processed using the List-Message

SECTION 11: LOGS


Auto-Accept option
These logs are not yet available through an API. Figures [86] and [87] show
examples of the SMTP and MTA logs.

[86] Admin > Logs > SMTP Log

[87] Admin > Logs > MTA Log

PA G E 6 1
A D M I N I S T R AT I O N M A N U A L SENDIO

Exporting
The logs can also be exported to a text (.TXT) file, shown
in Figure [89]. The dialog box in Figure [88] allows the
Administrator to enter date boundaries and a useful
“matching criteria” for the export.
Exporting defaults the the previous 24 hours. Click on
different dates to change the start/stop days of the log
information. To change the hour or minute of the log data
click the value to increase or shift-click to descrease.
SECTION 11: LOGS

[88] Log Export Criteria

[89] Admin > Logs Export Example

PA G E 6 2
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 12: QUEUE SUMMARY


This section provides IT Administrators with a deeper understanding of the
Queue Summary user experience to assist with implementation options within
the organization. A brief description of each Queue Summary setting is also
documented in Section 5: System Pages in this manual. If you use the Queue
Summary, refer to Section 5 in addition to this section.

Queue Summary Version 8 Software

N OTE: If you are a Sendio hosted service customer, you are running
the Version 8 software and (if enabled), your users have access to
all Queue Summary capabilities described in this section. If you
are an appliance or virtual appliance customer and are unsure
whether you are running Version 8, contact support@sendio.com
for clarification. The Queue Summary for previous software versions
(Versions 5,6, and 7) is described in “Queue Summary Versions 5, 6,
and 7 Software” on page 66.

SECTION 12: QUEUE


If you turned on the feature, the Queue Summary will be sent to that user’s

SUMMARY
inbox either once per day or twice per day based on the IT Administrator’s
decision. The Queue Summary is a concise and proactive way to communicate
the recent additions to a user’s Pending Message Queue and new Contacts (i.e.,
recent additions to the user’s Accept-List). The Queue Summary is always sent
to a user, even if there are no new messages in the user’s Pending Queue. See
Figure [90] for a pictorial view of the Queue Summary.

Click here to log in to


your full Sendio Message Queue (Web UI)

Change new Accept Contacts to Drop Contacts


to stop further emails from the sender.

Mouse click on the sender name


to view the body of email message.

Add/Drop messages or Senders

[90] Pictorial View of the Queue Summary

PA G E 6 3
A D M I N I S T R AT I O N M A N U A L SENDIO

Feature Highlights of the Version 8 Queue Summary


▪▪ Smartphone Optimized: The Version 8 Queue Summary is optimized for use on a Smartphone or tablet. Messages can be
released to the Inbox quickly with simple screen taps on the phone or tablet.
▪▪ Only recent Pending messages: Pending messages older than 28 hours no longer appear in the Version 8 Queue Summary.
Instead only the most recent 28 hours of pending messages are shown. The previous version of the Queue Summary
showed the last 50 pending messages, even if some messages were several days in the past. This change allows users to
quickly find and Accept messages. Although the most recent 28 hours of messages are shown, no more than 50 total
messages will be shown in each section of the Queue Summary. To access the additional messages (i.e., < 50 for last 28
hours), log in to the Sendio Message Queue Web UI.
▪▪ “New Contacts” information: The “New Contacts “ section of the Queue Summary email shows all Contacts that have
been automatically added to the user’s Accept-List in the last 28 hours via the challenge email (also known as the “Sender
Address Verification” email). These Contacts can be changed to Drop Contacts with one mouse click, blocking emails from
that sender in the future.
▪▪ Option for two Queue Summaries per day: IT Administrators can enable two Queue Summaries per day for users: “all”
or “none”. This setting means you cannot have a subset of users who get the Queue Summary twice per day and the
remaining users who receive the Queue Summary once per day. If you use two Queue Summaries per day, schedule them
to be delivered at least 5 hours apart.
▪▪ View the body of held messages: Users can easily view the body of any held message directly from the Queue Summary
email. Figure [90] shows the easy mouse click on the sender name, which displays the header and body of the held
SECTION 12: QUEUE

message. (Note: Pop-ups must be enabled in the web browser.)


SUMMARY

▪▪ Automatic login option: If enabled, non-Administrator users can click any link from the Queue Summary email to log
in automatically with no password ever required. This setting can be enabled globally or per user Account. It can be
especially useful for distribution group Accounts (e.g., info@, sales@) to avoid creating a local Sendio password. For
security, the authorization token built into each http link in the Queue Summary expires automatically after 28 hours. To
prevent unwanted access to Administrator functions, this automatic login feature is not allowed if your Account on Sendio
is a designated Administrator Account.
▪▪ Alternate email address for the Queue Summary: For individual user Accounts, Administrators can specify an alternate
email address to receive the Queue Summary. See Section 9 for information about the “Queue Summary Custom
Recipient Address List” field. The two common use cases are:
1) A senior manager wants to easily delegate monitoring of their Sendio pending queue to an administrative assistant.
2) For large distribution groups (e.g., info@,sales@), the Queue Summary can be specified to go to only 1 or 2 members
of the group.
This feature is often used with the “Automatic Login” feature so that the person monitoring the pending queue does not
require a separate “local” login password on Sendio.
▪▪ Message Statistics: Quick snapshot of total messages arrived into the user’s Sendio Account in the last 24 hours and the
total Accepted messages in the last 24 hours (i.e., messages delivered to Inbox).
▪▪ Unsubscribe option: This one-click option allows users to unsubscribe from future Queue Summary emails without
requiring the IT Administrator. By default, this feature is enabled, but it can be disabled. A user who is unsubscribed from
this Queue Summary can subscribe to it within the “Details” tab of their Sendio Message Queue (Web UI).

Queue Summary-Supported Web Browsers (other browsers may work, but are not formally supported)

Platform Browser
Desktop - Microsoft Windows Chrome, Internet Explorer 11, and Mozilla Firefox
Desktop - Mac Chrome, Mozilla Firefox, and Safari
Apple Iphone 5S, 6, and 6+ Safari
Samsung Galaxy S5 Android Chrome and Android default browser
Google Nexus 6 Android Android default browser
Apple iPad Safari
Samsung Galaxy Android Chrome

PA G E 6 4
SENDIO A D M I N I S T R AT I O N M A N U A L

Accepting and Dropping Messages and Senders in Sendio Version 8


Accepting a Message
1. Click the “Accept” button. A pop-up similar to the one in
Figure [91] appears.
2. Click the “Just this One” option to deliver the message to
the Inbox.
[91] Popup After Clicking the “Accept” Button
Accepting a Message and Adding Sender to the User’s Accept-List
1. Click the “Accept” button. A pop-up similar to the one in
Figure [91] appears.
2. Click the “Accept All” option. The message is delivered to
the Inbox and the sender is added to the user’s Accept-List.
Dropping a Message
1. Click the “Drop” button. A pop-up similar to the one in
Figure [92] appears.
2. Click the “Just This One” option to move the message into
the “Dropped Messages” section of the pending queue.
[92] Popup After Clicking the “Drop” Button Dropping a Message and Adding Sender to the User’s Accept-List
1. Click the “Drop” button. A pop-up similar to the one in
Figure [92] appears.

SECTION 12: QUEUE


2. Click the “Drop All” option. The message moves to the

SUMMARY
“Dropped Messages” section of the pending queue and the
sender is added to the user’s Drop-List.

Pending Messages Section of the Queue Summary

New Pending Messages


This section contains pending message for senders that are neither
Contacts nor tagged as “Bulk”.

New Pending Bulk


This section contains pending messages for senders that are not
Contacts and who have been tagged with the “Bulk” tag in Sendio. In
general, the messages in this section are more likely to be unwanted
spam messages. By default, this section is shown to users. If you
do not want this section show to one or more users, set “Queue
Summary Show Alternate” to “Disable” in System/Options or in the
“Options” tab for an individual Account.

N OTE: A message with “Held by Admin” text next to the


message cannot be accepted to the Inbox by the user.
Only an Administrator can release such a message.
Admin Holds occur for IP Reputation flags, Virus flags,
and SPF checking flags.

PA G E 6 5
A D M I N I S T R AT I O N M A N U A L SENDIO

Queue Summary Versions 5, 6, and 7 Software


If enabled, a Queue Summary email that shows the most recent 50
records in a user’s Pending Queue will be sent to that user’s inbox.
This email is a brief and concise means of communicating the recent
additions to a user’s Pending Queue.
If the Remember Me option in the Admin > System > Options page is
Enabled, four “actions” available from this email, by clicking on a link:
▪▪ a message can be released [A-MSG]
▪▪ a message can be dropped [D-MSG]
▪▪ a message can be released and the sender address can be
added to the user’s Accept-List [A-SND]
▪▪ a message can be dropped and the sender address can be
added to the user’s Drop-List [D-SND]
These functions are completely analogous to the functions on Sendio
web interface.

N OTE: It is a good practice to deploy both an internal and


external DNS name that is identical for use in the
SECTION 12: QUEUE

configuration of access to the Queue Summary. In this


way, both internal and external users can take advantage
SUMMARY

of this feature.

[93] Typical Queue Summary Message

[94] Queue Summary Message Addition When “Show Alternate” Option is Enabled

PA G E 6 6
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 13: DKIM PRIMER


Per the DKIM.org Web site:
DomainKeys Identified Mail (DKIM) lets an organization take
rSendioonsibility for a message while it is in transit. The organization is
a handler of the message, either as its originator or as an intermediary.
Their reputation is the basis for evaluating whether to trust the message
for delivery. Technically, DKIM provides a method for validating a domain
name identity that is associated with a message through cryptographic
authentication.
The first version of DKIM synthesized and enhanced Yahoo!’s DomainKeys
and Cisco’s Identified Internet Mail specifications. The IETF has now
approved the revised specification as a Proposed Standard and published it
as RFC 4871.
DKIM is not an anti-spam technology. It is a concept that is being rapidly
adopted to prevent the spoofing of Internet Mail. The benefit to the DKIM
design is that it avoids overloading the “main” TXT record for a domain

SECTION 13: DKIM PRIMER


(e.g., sendio.ca.com). If this domain wanted to use both DKIM and SPF (and
maybe other TXT records for other purposes), then it may end up with too
many TXT records returned to the query for the domain and the “right” record
may not reach the requestor.
DKIM is a cryptographic, signature-based type of email authentication. It is a
combination of Yahoo’s DomainKeys (DK) and Cisco’s Identified Internet Mail.
DKIM requires email senders’ MTAs or edge devices to generate “public/private
key pairs” and then publish the public keys into their Domain Name System
(DNS) records. The matching private keys are stored in a sender’s outbound
email servers, and when those servers send out email, the private keys are
used to generate message-specific “signatures” that are added into additional,
embedded email headers.
ISPs that authenticate using DKIM look up the public key in DNS and then
can verify that the signature was generated by the matching private key. This
ensures that an authorized sender actually sent the message, and that the
message headers and content were not altered in any way during their trip
from the original sender to the recipient.
The DKIM authentication process involves checking the integrity of the message
using the public key included in the email signature header, in addition to
verifying whether the public key used to sign the message is authorized for use
with the sender’s email address. This step currently involves utilizing the DNS
record of the sending domain. The authorization records in the DNS contain
information about the binding between a specific key and email address. Using
a US Postal Service analogy, DKIM is like verifying a unique signature, which is
valid regardless of the envelope or letterhead it was written on.

DKIM History
Yahoo has been working on a solution to the spam and phishing problem since
at least 2003, when it introduced the core DomainKeys technology. By 2004,
the company was signing all of its outgoing mail with DomainKeys as well as
verifying all incoming mail. By 2005, over 300 million email messages a day
were going through this verification at Yahoo alone. The U.S. patent, number
6,986,049, was assigned to Yahoo. In late May of 2007, the Internet Engineering

PA G E 6 7
A D M I N I S T R AT I O N M A N U A L SENDIO

Task Force (IETF) approved DomainKeys Identified Mail as a proposed standard,


RFC 4871. This move lends an extra layer of legitimacy to the email authentication
framework, and will help give the system an edge over Microsoft’s proposed
Sender ID system.
With this nod from the IETF, Yahoo and the other companies involved in DKIM’s
creation plan to work with ISPs, enterprises, e-commerce organizations, financial
institutions and (yes) the open source community to ensure that the specification
is quickly adopted and incorporated into many future products. Other supporters
of the DKIM standard include AOL, EarthLink, IBM, VeriSign, IronPort Systems, Cox
Communications and Trend Micro.

Scenario
Suppose that eBay wants to send an email to some of their users about their
accounts. And suppose that it uses DKIM. That means eBay’s outgoing mail server
will add a digital signature to the message – usually embedded in the message
headers, where human eyes do not see it. The digital signature serves the same
purpose as a human one; it’s proof that the mail came from the source it says it
came from.
The system needs to be used by both the sender’s and recipient’s mail servers to
SECTION 13: DKIM PRIMER

be truly effective. It is also worth noting that this system will not flag spam sent
by a legitimate company.
What DKIM will do is make it easier to track abusive domain owners. That alone
can be a huge help in the battle against spam.
As use of DKIM becomes more widespread, spammers will be forced to use fewer
and fewer domains. As mentioned before, domains with legitimate DomainKeys
will be easier to trace; therefore if they start abusing the system and permitting
spam to go through, it will be much easier to see where such email is coming
from. Also, once DKIM is more widely used, it should stop phishing attacks so long
as the DomainKeys can’t be forged.

INTERESTING MARKET NOTE


So far, DKIM has been adopted by 48 percent of large online retailers.
Unfortunately, a number of very large retailers have not yet adopted DKIM;
these include Dell, Wal-Mart, Target, Gap and Macy’s. It is understandable
why they have been slow to adopt the technology since there is a considerable
effort required to deploy it. Recipients only need to have email accounts with
email providers that support DKIM, such as Yahoo! Mail and Google’s Gmail. But
senders must generate a public/private key pair, add the public key to their DNS
entry as a TXT record, and make the private key available to the MTA software.
One of DKIM’s advantages over an earlier version of the same technology is that
it supports digital signatures by authorized third parties. This permits a legitimate
sender of email newsletters, for example, to outsource the bulk mailing. It should
also make it easier to maintain a legitimate signature when the email passes
through several forwarders before arriving at its destination. Also, because of the
way DKIM works, recipients can verify whether an email has been altered during
transmission.
So DKIM’s impact on phishing might be fairly immediate, because it verifies that
emails come from where they say they come from. For spam, however, it will
probably take somewhat longer, because there’s nothing to prevent a spammer
from getting a key and sending out verified email. The spammer then has to build
a reputation as a spammer unless there is a sender verification process such as
that integrated into Sendio.

PA G E 6 8
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 14: MESSAGING INTERACTION


A few options that are used by Sendio may affect the interaction with the other
components of your messaging environment.
Attachment Size: The default attachment size incoming to Sendio is 50
Megabytes. This size should be made larger or consistent with the message size
on the MTA.
Timeout Values: Certain timeout values associates with the SMTP conversation
can be modified if necessary.
System Response: The system response value e.g., sendio.<yourdomain>.com
can be modified if necessary.
There are several SMTP compliant error messages that are associated with
Sendio. If an error message is received as a result of an email, it is possible to
compare this error against the list below to discover if the message came from
Sendio or from another point in the messaging infrastructure.

No error -- continue:

SECTION 14: MESSAGE


235 ok, go ahead (#2.0.0)

INTERACTION
Temporary errors which cause a deferral:
421 out of memory (#4.3.0)
421 unable to figure out my IP addresses (#4.3.0)
421 unable to read controls (#4.3.0)
451 qmail-spp failure: %ERRDETAIL1%: %ERRDETAIL2% (#4.3.0)
451 qqt failure (#4.3.0)
451 timeout (#4.4.2)
451 sorry, your envelope sender domain must exist (#4.1.8)
451 DNS lookup for your envelope sender domain failed (#4.1.8)
451 temporary error looking up your envelope sender domain (#4.1.8)
451 mailbox temporarily unavailable (#4.2.1)
454 oops, child won’t start and I can’t auth (#4.3.0)
454 oops, problem with child and I can’t auth (#4.3.0)
454 oops, unable to open pipe and I can’t auth (#4.3.0)
454 oops, unable to write pipe and I can’t auth (#4.3.0)

Permanent errors which cause a rejection:


500 Your email was rejected because it contains the %VIRNAME% virus
501 auth exchange canceled (#5.0.0)
501 malformed auth input (#5.5.4)
501 Syntax error in options or argument. Illegal domain name
SENDERDOMAIN% (#5.1.7)

PA G E 6 9
A D M I N I S T R AT I O N M A N U A L SENDIO

501 Syntax error in options or argument (#5.1.7)


501 syntax error in options or argument (#5.1.3)
502 unimplemented (#5.5.1)
503 auth not available (#5.3.3)
503 MAIL first (#5.5.1)
503 no auth during mail transaction (#5.5.0)
503 RCPT first (#5.5.1)
503 you’re already authenticated (#5.5.0)
504 auth type unimplemented (#5.5.1)
535 authentication failed (#5.7.1)
550 wrong address for rSendioonding to an address verification request. Your
address has not been verified. Please see text of verification request message
for instructions. (#5.7.1)
550 mailbox unavailable (#5.1.2)
550 mailbox unavailable (#5.1.1)
SECTION 14: MESSAGE

552 sorry, that message size exceeds my databytes limit (#5.3.4)


INTERACTION

553 sorry, that domain isn’t in my list of allowed rcpthosts (#5.7.1)


553 sorry, your envelope sender is in my badmailfrom list (#5.7.1)
554 too many hops, this message is looping (#5.4.6)
555 syntax error (#5.5.4)

PA G E 7 0
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 15: SYSTEM EMAIL MESSAGES


Sendio generates a variety of alert and informational messages that are sent as
emails to Users and Administrators.

MAINTENANCE RELEASE NOTIFICATIONS


There are four messages that Administrators may receive regarding new
Maintenance Release software updates.
▪▪ Notification that a Maintenance Release is scheduled for Automatic
Installation [95]
▪▪ Notification that a Maintenance Release is scheduled for Automatic
Installation when no Alert Addresses have been specified in sysconfig
shell [96]
▪▪ Notification that a Maintenance Release has been downloaded to
Sendio and is available for manual installation [97]

SECTION 15: SYSTEM Email


▪▪ Notification that a Maintenance Release has been successfully
automatically installed [98]

MESSAGES
Notice Date: 2008-02-29 23:54,

This automated notification is to inform you that Sendio has finished downloading a new Maintenance Release that is ready to be installed.

Current Sendio Version: Mar 08 SU (0227.0)


Maintenance Release Version: Mar 08 SU (0229.8)
Automatic Update Scheduled: Sun Mar 02, 12:00 AM PST

You have Automatic Updates enabled (recommended). If you take no further action, Mar 08 SU (0229.8) will be installed at your next scheduled
update time on Sun Mar 02 at 12:00 AM PST. If you want it to be installed at a different time, you may:

o Manually install at any time before the scheduled time


o Configure a different automatic update time
o Temporarily disable automatic updates

To manually install this Maintenance Release:

1. Log into the sysconfig console.

2. Navigate to “Sendio Update” on the left side of sysconfig interface and press Enter.

3. Navigate to the “Apply Maintenance Release” button and press Enter.

To configure a different Automatic Update time or temporarily disable Automatic Updates:

1. Log into the sysconfig console.

2. Navigate to “Backup/Maintenance” on the left side of sysconfig interface and press Enter.

3. Navigate to the “System Automatic Update” section and use the “Add” and “Delete” buttons to change the schedule.

4. Navigate to the “Save” button at the bottom of the “System Automatic Update” section after making changes and press Enter.

[95] Maintenance Release Scheduled for Automatic Installation

PA G E 7 1
A D M I N I S T R AT I O N M A N U A L SENDIO

==============================
NOTICE
==============================
You received this message because no ‘Alert Addresses’ have been specified via the Sysconfig shell.

You can set this value by going to the System Configuration tab.

Notice Date: 2008-03-03 18:40,

This automated notification is to inform you that Sendio has finished downloading a new Maintenance Release that is ready to be installed.

Current Sendio Version: Mar 08 SU (0227.0)


Maintenance Release Version: Mar 08 SU (0303.0)
Automatic Update Scheduled: Tue Mar 04, 12:00 AM PST

You have Automatic Updates enabled (recommended). If you take no further action, Mar 08 SU (0303.0) will be installed at your next scheduled
update time on Tue Mar 04 at 12:00 AM PST. If you want it to be installed at a different time, you may:

o Manually install at any time before the scheduled time


o Configure a different automatic update time
o Temporarily disable automatic updates

To manually install this Maintenance Release:


SECTION 15: SYSTEM Email

1. Log into the sysconfig console.

2. Navigate to “Sendio Update” on the left side of sysconfig interface and press Enter.
MESSAGES

3. Navigate to the “Apply Maintenance Release” button and press Enter.

To configure a different Automatic Update time or temporarily disable Automatic Updates:

1. Log into the sysconfig console.

2. Navigate to “Backup/Maintenance” on the left side of sysconfig interface and press Enter.

3. Navigate to the “System Automatic Update” section and use the “Add” and “Delete” buttons to change the schedule.

4. Navigate to the “Save” button at the bottom of the “System Automatic Update” section after making changes and press Enter.

[96] Maintenance Release Scheduled for Automatic Installation; No Alert Addresses Specified

PA G E 7 2
SENDIO A D M I N I S T R AT I O N M A N U A L

Notice Date: 2008-03-01 10:38,

This automated notification is to inform you that Sendio has finished downloading a new Maintenance Release that is ready to be installed.

Current Sendio Version: Mar 08 SU (0229.6)


Maintenance Release Version: Mar 08 SU (0229.9)
Automatic Update Scheduled: N/A. Automatic Updates disabled

You do not currently have Automatic Updates enabled. To get the benefits of the new release, you will need to do one of the following:

o Enable Automatic Updates


o Install this Maintenance Release manually.

To enable Automatic Updates:

1. Log into the sysconfig console.

2. Navigate to “Backup/Maintenance” on the left side of sysconfig interface and press Enter.

3. Navigate to the “System Automatic Update” section and check the “Automatic Updates Enabled?” checkbox.

4. Review and change the schedule if required.

5. Navigate to the “Save” button at the bottom of the “System Automatic Update” section after making changes and press Enter.

SECTION 15: SYSTEM Email


To manually install this Maintenance Release:

MESSAGES
1. Log into the sysconfig console.

2. Navigate to “Sendio Update” on the left side of sysconfig interface and press Enter.

3. Navigate to the “Apply Maintenance Release” button and press Enter.

[97] Maintenance Release Available for Manual Installation

At 2008-03-01 00:04:25,
Sendio successfully updated to software version Mar 08 SU (0229.8).

[98] Maintenance Release Successfully Installed Automatically

PA G E 7 3
A D M I N I S T R AT I O N M A N U A L SENDIO

Domain: QA.vibx.SENDIO.net
Serial Number: QAtest
Sendio ESP Version: Sendio ESP v5 (10.0507.0)

Could not mount remote backup

[99] Push Backup Failed

Notice Date: Mon, 20 Apr 2009 14:59:00 -0700 (PDT)

Current Journaling Queue Size: 1010


Journaling Queue Alert Threshold: 1000
Journaling Queue Limit: 10000

Dear Sendio Admin,

Your Sendio message journaling queue has exceeded the configured alert
threshhold of 1000 messages. This usually indicates that the archival system(s)
being journaled to are either not reachable or are not able to journal messages
as quickly as messages are arriving.
SECTION 15: SYSTEM Email

PLEASE CONFIRM THAT YOUR ARCHIVAL SYSTEM(S) ARE REACHABLE BY THE SENDIO Sendio
DEVICE AND FUNCTIONING PROPERLY.
MESSAGES

You will continue to get alerts as long as the condition persists. You have
configured a minimum alert interval of 60 minutes, so the next alert will not
be sent before Mon, 20 Apr 2009 15:59:00 -0700 (PDT).

If necessary, Message Journaling options can be configured in the Options tab


of the System page in Sendio Admin GUI.

Recent Journaling Queue Size History:

queued
messages
== 2009-04-20 ==
14:59:00 1010
14:58:00 905

[100] Journaling Queue Alert Notification

PA G E 7 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SECTION 16: SAV MESSAGES


Part of Sendio email integrity workflow is Sender Address Verification (SAV).
Sendio generates SAV messages when an email is received from a sender that
is not on a Contact list. These messages are based on templates which have
dynamic fields that are filled in when a specific message is generated by Sendio.
There are three messages templates that are used as part of the Sender
Address Verification process:
▪▪ SAV Request: the message that is sent to “challenge” an unknown
email sender to verify they are not a spam-bot
▪▪ SAV Acknowledgement: the message that thanks a now “known”
email sender for “rSendioonding” to the challenge message
▪▪ SAV Bounce: the message that is sent if an SAV response is received
for a message that is no longer in an Sendio message queue (timed-
out or deleted), or if there are multiple recipients for a message with
different policies that makes an SMTP reject inappropriate

SECTION 16: SAV MESSAGES


Examples of these three templates are shown in Figures [101], [102] and [103].
Each of these SAV message templates are available in four language versions:

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: [orgname] requests that you verify your email address: please REPLY to this email. -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]
X-Priority: 1
Priority: Urgent
Importance: high

______________________________________________________________________

Message from “[username]”


______________________________________________________________________

I recognize from your email address that this is the first message I have received from you since [orgname] began using Sender Address
Verification (SAV).

Your message is very important to me. Like you, we are very concerned with stopping the proliferation of spam. We have implemented Sender
Address Verification (SAV) to ensure that we do not receive unwanted email and to give you the assurance that your messages to me have no
chance of being filtered into a bulk mail folder.

By pressing REPLY and SEND to this message your original message will be delivered to the top of my Inbox. You need only do this once and all
future emails will be recognized and delivered directly to me.

When replying to this email, please make sure that the following email address appears in the To: field of the reply:

[origconfirmaddr]

If you are unable to rSendioond to this authentication request within [pending_lifetime], or if your reply is not sent to the correct email address
(as indicated above), your message may not be delivered.

Thank you!

[username]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

[101] SAV Request Template

PA G E 7 5
A D M I N I S T R AT I O N M A N U A L SENDIO

▪▪ English
▪▪ English / Spanish
▪▪ Spanish / English
▪▪ Spanish

From: “[username]” <[useraddr]>


To: “[vfyfromname]” <[vfysenderaddr]>
Subject: Accepted: Sender Address Authentication -- [timestamp]
References: [origmsgid], [vfymsgid]
In-Reply-To: [vfymsgid]

That was easy! Thanks for your help.

Your address verification has been completed and your original message has been delivered. In the future you may enjoy the confidence of
SECTION 16: SAV MESSAGES

knowing that all your messages will be promptly delivered to my Inbox.

[responsereason]

_______________________________________________________________________
Sender Address Verification (SAV) provided by Sendio.

To find out how you can have 100% spam-free email, please visit Sendio at
http://[sendiourl]/how-sender-authentication-works.html

[102] SAV Acknowledgement Template

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: Problem with your message -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]

‘The Sender Address Verification (SAV) system at [orgname] has encountered a problem with the message you sent:

[responsereason]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

[103] SAV Bounce Template

PA G E 7 6
SENDIO A D M I N I S T R AT I O N M A N U A L

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: [orgname] requests that you verify your email address: please REPLY to this email. -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]
X-Priority: 1
Priority: Urgent
Importance: high

______________________________________________________________________

Message from “[username]”


______________________________________________________________________

I recognize from your email address that this is the first message I have received from you since [orgname] began using Sender Address
Verification (SAV).

Your message is very important to me. Like you, we are very concerned with stopping the proliferation of spam. We have implemented Sender
Address Verification (SAV) to ensure that we do not receive unwanted email and to give you the assurance that your messages to me have no
chance of being filtered into a bulk mail folder.

By pressing REPLY and SEND to this message your original message will be delivered to the top of my Inbox. You need only do this once and all
future emails will be recognized and delivered directly to me.

SECTION 16: SAV MESSAGES


When replying to this email, please make sure that the following email address appears in the To: field of the reply:

[origconfirmaddr]

If you are unable to rSendioond to this authentication request within [pending_lifetime], or if your reply is not sent to the correct email
address (as indicated above), your message may not be delivered.

Thank you!

[username]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

______________________________________________________________________

Un mensaje de “[username]”
______________________________________________________________________

Al parecer este mensaje es el primero que usted me envía desde que implementamos el Sistema de Verificación de Dirección del Remitente
(SAV).

Su mensaje es importante para mí, y como me imagino que usted también lucha contra el SPAM como yo, le cuento que hemos implementado
SAV, un poderoso sistema de verificación de quien envía correos electrónicos, para asegurarme de no recibir correos electrónicos indeseados.

Por favor, solo rSendioonda a este mensaje al presionar la opción RSendioonder y luego Envía. Con esto se confirma su dirección. Haciendo
solo esto sus futuros mensajes ya serán automáticamente aceptados al ser reconocido y entraran directamente a mi casilla de correos.

Cuando rSendioonda a este mensaje, asegúrese de que la dirección a la cual esta contestando sea:

[origconfirmaddr]

Si usted no rSendioonde a este pedido de verificación de dirección durante [pending_lifetime], o si su rSendiouesta no es enviada a la dirección
indicada arriba, su mensaje original nunca será dSendioachado.

Muchas Gracias!

[username]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

[104] SAV Request Template - English/Spanish

PA G E 7 7
A D M I N I S T R AT I O N M A N U A L SENDIO

From: “[username]” <[useraddr]>


To: “[vfyfromname]” <[vfysenderaddr]>
Subject: Accepted: Sender Address Authentication -- [timestamp]
References: [origmsgid], [vfymsgid]
In-Reply-To: [vfymsgid]

That was easy! Thanks for your help.

Your address verification has been completed and your original message has been delivered. In the future you may enjoy the confidence of
knowing that all your messages will be promptly delivered to my Inbox.

[responsereason]

_______________________________________________________________________
Sender Address Verification (SAV) provided by Sendio.

To find out how you can have 100% spam-free email, please visit Sendio at
http://[sendiourl]/how-sender-authentication-works.html

Así de Fácil! Gracias por su colaboración.


SECTION 16: SAV MESSAGES

Su Verificación de Dirección ha sido realizada y su mensaje original dSendioachado a la casilla de correos. En el futuro usted podrá estar
asegurado que sus mensajes pasaran directo a mi casilla de correo.

[responsereason]

_______________________________________________________________________
Verificación de Dirección del Remitente (SAV) realizado por SENDIO.

Si usted también desea parar el Spam en forma definitiva, por favor visíte a Sendio al
http://[sendiourl]/how-sender-authentication-works.html

[105] SAV Acknowledgement Template - English/Spanish

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: Problem with your message -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]

The Sender Address Verification (SAV) system at [orgname] has encountered a problem with the message you sent:

[responsereason]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

Este mensaje fue generado por el Sendio I.C.E. appliance.

Su correo electrónico fue aceptado por el Sendio, pero no pudo ser dSendioachado a su destino final. Si usted cree que el recibir este mensaje
es un error, por favor comuníquese con su administrador de sistema.

Los detalles le siguen:

[responsereason]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

[106] SAV Bounce Template - English/Spanish

PA G E 7 8
SENDIO A D M I N I S T R AT I O N M A N U A L

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: [orgname] le pide que usted verifique su dirección de correo electrónico: por favor RSendioONDA a este mensaje. -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]
X-Priority: 1
Priority: Urgent
Importance: high

______________________________________________________________________

Un mensaje de “[username]”
______________________________________________________________________

Al parecer este mensaje es el primero que usted me envía desde que implementamos el Sistema de Verificación de Dirección del Remitente
(SAV).

Su mensaje es importante para mí, y como me imagino que usted también lucha contra el SPAM como yo, le cuento que hemos implementado
SAV, un poderoso sistema de verificación de quien envía correos electrónicos, para asegurarme de no recibir correos electrónicos indeseados.

Por favor, solo rSendioonda a este mensaje al presionar la opción RSendioonder y luego Envía. Con esto se confirma su dirección. Haciendo
solo esto sus futuros mensajes ya serán automáticamente aceptados al ser reconocido y entraran directamente a mi casilla de correos.

SECTION 16: SAV MESSAGES


Cuando rSendioonda a este mensaje, asegúrese de que la dirección a la cual esta contestando sea:

[origconfirmaddr]

Si usted no rSendioonde a este pedido de verificación de dirección durante [pending_lifetime], o si su rSendiouesta no es enviada a la dirección
indicada arriba, su mensaje original nunca será dSendioachado.

Muchas Gracias!

[username]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

______________________________________________________________________

Message from “[username]”


______________________________________________________________________

I recognize from your email address that this is the first message I have received from you since [orgname] began using Sender Address
Verification (SAV).

Your message is very important to me. Like you, we are very concerned with stopping the proliferation of spam. We have implemented Sender
Address Verification (SAV) to ensure that we do not receive unwanted email and to give you the assurance that your messages to me have no
chance of being filtered into a bulk mail folder.

By pressing REPLY and SEND to this message your original message will be delivered to the top of my Inbox. You need only do this once and all
future emails will be recognized and delivered directly to me.

When replying to this email, please make sure that the following email address appears in the To: field of the reply:

[origconfirmaddr]

If you are unable to rSendioond to this authentication request within [pending_lifetime], or if your reply is not sent to the correct email
address (as indicated above), your message may not be delivered.

Thank you!

[username]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

[107] SAV Request Template - Spanish/ English

PA G E 7 9
A D M I N I S T R AT I O N M A N U A L SENDIO

From: “[username]” <[useraddr]>


To: “[vfyfromname]” <[vfysenderaddr]>
Subject: Aceptado: Autenticación de Dirección del Remitente -- [timestamp]
References: [origmsgid], [vfymsgid]
In-Reply-To: [vfymsgid]

Así de Fácil! Gracias por su colaboración.

Su Verificación de Dirección ha sido realizada y su mensaje original dSendioachado a la casilla de correos. En el futuro usted podrá estar
asegurado que sus mensajes pasaran directo a mi casilla de correo.

[responsereason]

_______________________________________________________________________
Verificación de Dirección del Remitente (SAV) realizado por SENDIO.

Si usted también desea parar el Spam en forma definitiva, por favor visíte a Sendio al
http://[sendiourl]/how-sender-authentication-works.html

That was easy! Thanks for your help.


SECTION 16: SAV MESSAGES

Your address verification has been completed and your original message has been delivered. In the future you may enjoy the confidence of
knowing that all your messages will be promptly delivered to my Inbox.

[responsereason]

_______________________________________________________________________
Sender Address Verification (SAV) provided by Sendio.

To find out how you can have 100% spam-free email, please visit Sendio at
http://[sendiourl]/how-sender-authentication-works.html

[108] SAV Acknowledgement Template - Spanish/ English

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: Su mensaje no pudo ser dSendioachado -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]

Este mensaje fue generado por el Sendio I.C.E. appliance.

Su correo electrónico fue aceptado por el Sendio, pero no pudo ser dSendioachado a su destino final. Si usted cree que el recibir este mensaje
es un error, por favor comuníquese con su administrador de sistema.

Los detalles le siguen:

[responsereason]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

The Sender Address Verification (SAV) system at [orgname] has encountered a problem with the message you sent:

[responsereason]

_______________________________________________________________________
100% spam-free email provided by Sendio (http://[sendiourl])

[109] SAV Bounce Template - Spanish/ English

PA G E 8 0
SENDIO A D M I N I S T R AT I O N M A N U A L

From: “[username]” <[useraddr]>


To: “[origfromname]” <[origsenderaddr]>
Subject: [orgname] le pide que usted verifique su dirección de correo electrónico: por favor RSendioONDA a este mensaje. -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]
X-Priority: 1
Priority: Urgent
Importance: high

______________________________________________________________________

Un mensaje de “[username]”
______________________________________________________________________

Al parecer este mensaje es el primero que usted me envía desde que implementamos el Sistema de Verificación de Dirección del Remitente
(SAV).

Su mensaje es importante para mí, y como me imagino que usted también lucha contra el SPAM como yo, le cuento que hemos implementado
SAV, un poderoso sistema de verificación de quien envía correos electrónicos, para asegurarme de no recibir correos electrónicos indeseados.

Por favor, solo rSendioonda a este mensaje al presionar la opción RSendioonder y luego Envía. Con esto se confirma su dirección. Haciendo
solo esto sus futuros mensajes ya serán automáticamente aceptados al ser reconocido y entraran directamente a mi casilla de correos.

SECTION 16: SAV MESSAGES


Cuando rSendioonda a este mensaje, asegúrese de que la dirección a la cual esta contestando sea:

[origconfirmaddr]

Si usted no rSendioonde a este pedido de verificación de dirección durante las próximas 2 semana, o si su rSendiouesta no es enviada a la
dirección indicada arriba, su mensaje original nunca será dSendioachado.

Muchas Gracias!

[username]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

[110] SAV Request Template - Spanish

PA G E 8 1
A D M I N I S T R AT I O N M A N U A L SENDIO

From: “[username]” <[useraddr]>


To: “[vfyfromname]” <[vfysenderaddr]>
Subject: Aceptado: Autenticación de Dirección del Remitente -- [timestamp]
References: [origmsgid], [vfymsgid]
In-Reply-To: [vfymsgid]

Así de Fácil! Gracias por su colaboración.

Su Verificación de Dirección ha sido realizada y su mensaje original dSendioachado a la casilla de correos. En el futuro usted podrá estar
asegurado que sus mensajes pasaran directo a mi casilla de correo.

Su mensaje original se encuentra adjunto.

_______________________________________________________________________
Verificación de Dirección del Remitente (SAV) realizado por SENDIO.

Si usted también desea parar el Spam en forma definitiva, por favor visíte a Sendio al
http://[sendiourl]/how-sender-authentication-works.html

[112] SAV Acknowledgement Template - Spanish


SECTION 16: SAV MESSAGES

From: “[username]” <[useraddr]>


From: “[username]” <[useraddr]>
To: “[origfromname]” <[origsenderaddr]>
Subject: Su mensaje no pudo ser dSendioachado -- [timestamp]
References: [origmsgid]
In-Reply-To: [origmsgid]

Este mensaje fue generado por el Sendio I.C.E. appliance.

Su correo electrónico fue aceptado por el Sendio, pero no pudo ser dSendioachado a su destino final. Si usted cree que el recibir este mensaje
es un error, por favor comuníquese con su administrador de sistema.

Los detalles le siguen:

[responsereason]

_______________________________________________________________________
Correo electrónico 100% libre de spam proveído por Sendio, Inc. (http://[sendiourl])

[111] SAV Bounce Template - Spanish

PA G E 8 2
SENDIO A D M I N I S T R AT I O N M A N U A L

GLOSSARY
Applications Programming Interface (API)
This is an interface that can be used by a third party to programmatically access
data in a secure fashion on Sendio.

DNS (port 53) Access


This port provides the Distributed Naming Service (DNS) access to Sendio. DNS
is a service that translates domain names into IP addresses. Because domain
names are alphabetic, they’re easier to remember. The Internet, however, is
really based on IP addresses. Every time you use a domain name, a DNS service
must translate the name into the corresponding IP address. For example, the
domain name www.example.com might translate to 198.105.232.4. The DNS
system is, in fact, its own network. If one DNS server doesn’t know how to
translate a particular domain name, it asks another one, and so on, until the
correct IP address is returned.

External Address (Primary)


If you do not have a Sendio cluster, this is the only external address you must

GLOSSARY
provide. This is the public address that will be NAT’ed to the server so that it
may be configured. The accuracy of this address is very important.

External Cluster Address


If you have a Sendio cluster, then you may provide a secondary address that is
movable within the firewall. This address cannot be bound to a MAC address, or
Sendio will not failover properly as intended.

External Network Gateway


Strictly speaking, a gateway is a means by which users of one computer system
can gain access to another without making a separate connection. The external
gateway is the address that is essentially provided by the ISP that allows other
network components to access the firewall and external network.

Firewall Address
This is the public IP address of your firewall. This may or may not be the public-
facing IP for your mail traffic (i.e., the MX record for your mail).

Graphical User Interface (GUI)


This is a user interface for interacting with a computer which employs graphical
images and text to represent the information and actions available to the user.

HTTP (port 80) Access


This port provides Sendio with a method to automatically update its internal
software and provides web interface access to Sendio for end users and for
administrative purposes.

PA G E 8 3
A D M I N I S T R AT I O N M A N U A L SENDIO

HTTPS (port 443) Access


This port provides Sendio with a method to update its internal software
automatically and provide web interface access to Sendio for end users and for
administrative purposes.

Internal Cluster Address (Primary)


If you do not have a Sendio cluster, then this is the only internal cluster address
you must provide. This address is the internal address of Sendio that allows the
secure connection from the internet. In many cases, this address begins with a
10.xxx.xxx.xxx or 192.168.xxx.xxx.

Internal Cluster Address (Secondary)


If you have a Sendio cluster, then you may provide a secondary address that is
movable within the firewall. This address cannot be bound to a MAC address, or
Sendio will not failover properly as intended.

Internal Mail Gateway


This is the address of the email server where Sendio should deliver mail after
processing. It should be an internal address. If Sendio and the mail server are
on different LAN segments or cross a DMZ, it is imperative that the firewall is
GLOSSARY

configured in such a way as to allow access from Sendio to the mail server.

Internal Network Gateway


This is the internal network address that Sendio and other network components
will use to access the outside world.

LDAP Communication URL


The LDAP Communication URL is sometimes called the Active Directory URL.
Sendio communicates with your Connection Directory Server through this URL
for address and account synchronization. For proper functionality, Sendio must
have a valid connection to an LDAP compliant domain controller. The common
ports for this communication are 389 for LDAP users or 3268 for Microsoft’s
Global Catalog.

LDAP Username/Password
Sendio requires a user name and password for proper connectivity to the
Domain Controller on your network. This user does not need a mail box,
requires only basic permissions, and the password must be set to never expire.

MTA
Mail Transfer Authority. This abbreviation is the generic term that references
the server that processes the messaging within an organization. Typical
examples are Exchange and Lotus Notes.

NTP (port 123) Access


The Network Time Protocol (NTP) port allows time synchronization between
devices. Bidirectional access is required. If you do not want to provide this
access to Sendio, you will need to provide the name and address of an internal
time server.

PA G E 8 4
SENDIO A D M I N I S T R AT I O N M A N U A L

SMTP (port 25) Access


The Simple Mail Transport Protocol (SMTP) port provides basic communication
between Sendio and other mail servers on your network and on the Internet.
Port 25 is required for sending SAV requests, and as such requires the ability to
originate and complete connections on port 25. Note that this is NOT an open
relay. Make sure that Sendio is permitted to make unrestricted connections to
your Exchange server for SMTP. Disable any rate limiting, as Sendio will become
the sole source of traffic to your mail server.

SSH (port 22) Access


Secure shell is a program to log into another computer over a network, to
execute commands in a remote machine, and to move files from one machine
to another. It provides strong authentication and secure communications over
insecure channels. This port provides Sendio with a method to automatically
update its internal software and to provide Sendio access to the server for
maintenance, troubleshooting or updates.

GLOSSARY

PA G E 8 5
Sendio, Inc.
4911 Birch, Suite 150
Newport Beach, CA 92660 USA
+1.949.274.4375

www.sendio.com

Vous aimerez peut-être aussi